Category: GBHackers

Hackers Intensify Use of This Manipulative Technique to Deceive Users
27
Jun
2025

Hackers Intensify Use of This Manipulative Technique to Deceive Users

A novel social engineering technique dubbed “ClickFix” has surged by an alarming 517% between the second half of 2024 and…

Windows Says Goodbye to Blue Screen of Death, Introduces Black Screen
27
Jun
2025

Windows Says Goodbye to Blue Screen of Death, Introduces Black Screen

After nearly four decades as a symbol of frustration and failure for PC users worldwide, Microsoft is officially retiring the…

Mitsubishi Electric AC Flaw Lets Hackers Remotely Control Systems
27
Jun
2025

Mitsubishi Electric AC Flaw Lets Hackers Remotely Control Systems

A critical security vulnerability has been discovered in multiple Mitsubishi Electric air conditioning systems, potentially allowing hackers to bypass authentication…

University Student Charged for Alleged Hacking and Data Theft
27
Jun
2025

University Student Charged for Alleged Hacking and Data Theft

A 27-year-old former student of Western Sydney University has been charged with a string of cyber offences, following an extensive…

Pre-Auth Flaw in MongoDB Server Allows Attackers to Cause DoS
27
Jun
2025

Pre-Auth Flaw in MongoDB Server Allows Attackers to Cause DoS

A critical pre-authentication vulnerability (CVE-2025-6709) in MongoDB Server enables unauthenticated attackers to trigger denial-of-service (DoS) conditions by exploiting improper input…

Kansas City Man Pleads Guilty After Hacking to Promote His Cybersecurity Services
27
Jun
2025

Kansas City Man Pleads Guilty After Hacking to Promote His Cybersecurity Services

A Kansas City man has pleaded guilty to federal charges after admitting he hacked into the computer systems of multiple…

Open VSX Marketplace Flaw Enables Millions of Developers at Risk of Supply Chain Attacks
27
Jun
2025

Open VSX Marketplace Flaw Enables Millions of Developers at Risk of Supply Chain Attacks

A newly disclosed critical vulnerability in the Open VSX Registry, the open-source marketplace for Visual Studio Code (VS Code) extensions,…

Researchers Weaponize and Obfuscate .NET Assemblies Using MacroPack
26
Jun
2025

Researchers Weaponize and Obfuscate .NET Assemblies Using MacroPack

Researchers at BallisKit have introduced a sophisticated scenario within their MacroPack Pro tool to obfuscate and weaponize .NET assemblies, significantly…

IBM WebSphere Application Server Flaw Enables Arbitrary Code Execution
26
Jun
2025

IBM WebSphere Application Server Flaw Enables Arbitrary Code Execution

A severe security flaw has been identified in IBM WebSphere Application Server, potentially allowing remote attackers to execute arbitrary code…

Iranian APT35 Hackers Targeting High-Profile Cybersecurity Experts and Professors in Israel
26
Jun
2025

Iranian APT35 Hackers Targeting High-Profile Cybersecurity Experts and Professors in Israel

The Iranian threat group Educated Manticore, also tracked as APT35, APT42, Charming Kitten, or Mint Sandstorm, has intensified its cyber-espionage…

nOAuth Exploit Enables Full Account Takeover of Entra Cross-Tenant SaaS Applications
26
Jun
2025

nOAuth Exploit Enables Full Account Takeover of Entra Cross-Tenant SaaS Applications

A severe security flaw, dubbed nOAuth, has been identified in certain software-as-a-service (SaaS) applications integrated with Microsoft Entra ID, potentially…

US University Targeted by Androxgh0st Botnet Operators for C2 Logger Hosting
26
Jun
2025

US University Targeted by Androxgh0st Botnet Operators for C2 Logger Hosting

CloudSEK’s TRIAD team has made the shocking discovery that the Androxgh0st botnet is a persistent and dynamic cyberthreat. It has…