Category: GBHackers

Iranian Spear-Phishing Attack Impersonates Google, Outlook, and Yahoo Domains
26
Jun
2025

Iranian Spear-Phishing Attack Impersonates Google, Outlook, and Yahoo Domains

Check Point Research has uncovered a renewed global spear-phishing campaign orchestrated by the Iranian threat actor Educated Manticore, also known…

HPE OneView for VMware vCenter Vulnerability Allows Elevated Access
26
Jun
2025

HPE OneView for VMware vCenter Vulnerability Allows Elevated Access

Hewlett Packard Enterprise (HPE) has issued a critical security bulletin warning customers of a significant vulnerability in its OneView for…

Threat Actors Exploit ChatGPT, Cisco AnyConnect, Google Meet, and Teams in Attacks on SMBs
26
Jun
2025

Threat Actors Exploit ChatGPT, Cisco AnyConnect, Google Meet, and Teams in Attacks on SMBs

Threat actors are increasingly leveraging the trusted names of popular software and services like ChatGPT, Cisco AnyConnect, Google Meet, and…

Authorities Charge 25-Year-Old British National Linked to IntelBroker Hacks
26
Jun
2025

Authorities Charge 25-Year-Old British National Linked to IntelBroker Hacks

 In a major breakthrough in the fight against cybercrime, U.S. and French authorities have charged and detained 25-year-old British national…

WhatsApp to Introduce AI-Powered Message Summaries for Faster Catch-Up
26
Jun
2025

WhatsApp to Introduce AI-Powered Message Summaries for Faster Catch-Up

WhatsApp has announced the upcoming launch of “Message Summaries”—an AI-powered feature designed to help users quickly catch up on unread…

Cisco ISE Vulnerability Allows Remote Attackers to Execute Malicious Command
26
Jun
2025

Cisco ISE Vulnerability Allows Remote Attackers to Execute Malicious Command

Cisco has issued urgent security patches addressing two critical vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity…

Microsoft Teams Adds Feature for Admins to Control 365 Certified Apps with Custom Rules
26
Jun
2025

Microsoft Teams Adds Feature for Admins to Control 365 Certified Apps with Custom Rules

Microsoft is rolling out a major update to Microsoft Teams, empowering administrators with enhanced control over third-party app availability through…

Cybercriminals Exploit LLM Models to Enhance Hacking Activities
26
Jun
2025

Cybercriminals Exploit LLM Models to Enhance Hacking Activities

Cybercriminals are increasingly leveraging large language models (LLMs) to amplify their hacking operations, utilizing both uncensored versions of these AI…

Chinese Hackers Deploy Pubload Malware Using Tibetan Community Lures and Weaponized Filenames
26
Jun
2025

Chinese Hackers Deploy Pubload Malware Using Tibetan Community Lures and Weaponized Filenames

IBM X-Force researchers have uncovered a series of targeted cyberattacks orchestrated by the China-aligned threat actor Hive0154. Throughout 2025, this…

Cybercriminals Use TeamFiltration Pentesting Framework to Breach Microsoft Teams, OneDrive, Outlook, and More
26
Jun
2025

Cybercriminals Use TeamFiltration Pentesting Framework to Breach Microsoft Teams, OneDrive, Outlook, and More

Proofpoint threat researchers have exposed an active account takeover (ATO) campaign, dubbed UNK_SneakyStrike, exploiting the TeamFiltration pentesting framework to target…

CISA Issues Alert on Active Exploitation of D-Link Path Traversal Flaw
26
Jun
2025

CISA Issues Alert on Active Exploitation of D-Link Path Traversal Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert following evidence of active exploitation of a…

Researchers Demonstrate Windows Registry Manipulation via C++ Program
26
Jun
2025

Researchers Demonstrate Windows Registry Manipulation via C++ Program

Cybersecurity researchers have developed a C++ program demonstrating how attackers manipulate the Windows Registry to establish persistence, evade defenses, and…