Category: GBHackers

Microsoft IIS Exploit Allows Unauthenticated Attackers to Run Arbitrary Code
15
Oct
2025

Microsoft IIS Exploit Allows Unauthenticated Attackers to Run Arbitrary Code

A serious security flaw has been discovered in Microsoft’s Internet Information Services (IIS) that lets attackers run arbitrary code without…

Critical Veeam Backup RCE Flaws Allow Remote Execution of Malicious Code
15
Oct
2025

Critical Veeam Backup RCE Flaws Allow Remote Execution of Malicious Code

Veeam has released an urgent security patch to address multiple critical remote code execution (RCE) vulnerabilities in Veeam Backup &…

FortiPAM & FortiSwitch Manager Flaw Allows Attackers to Bypass Authentication
15
Oct
2025

FortiPAM & FortiSwitch Manager Flaw Allows Attackers to Bypass Authentication

Fortinet has disclosed a critical security vulnerability affecting FortiPAM and FortiSwitchManager products that could enable attackers to bypass authentication mechanisms…

GhostBat RAT Android Malware Poses as Fake RTO Apps to Steal Banking Data from Indian Users
15
Oct
2025

GhostBat RAT Android Malware Poses as Fake RTO Apps to Steal Banking Data from Indian Users

The GhostBat RAT campaign leverages diverse infection vectors—WhatsApp, SMS with shortened URLs, GitHub-hosted APKs, and compromised websites—to distribute malicious Android…

Hackers Exploit Windows Remote Access Connection Manager 0-Day in Ongoing Attacks
15
Oct
2025

Hackers Exploit Windows Remote Access Connection Manager 0-Day in Ongoing Attacks

Microsoft has confirmed active exploitation of a critical zero-day vulnerability affecting the Windows Remote Access Connection Manager, designated as CVE-2025-59230….

UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops
15
Oct
2025

UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops

Security researchers have uncovered critical vulnerabilities in signed UEFI shells that allow attackers to completely bypass Secure Boot protections on…

Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence
15
Oct
2025

Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence

The China-backed advanced persistent threat group Flax Typhoon maintained year-long access to an ArcGIS system by turning trusted software into…

End of Support for Windows 10 Sparks Security Fears Among Millions of Users
15
Oct
2025

End of Support for Windows 10 Sparks Security Fears Among Millions of Users

Microsoft officially ended support for Windows 10 on October 14, 2025, leaving millions of users worldwide facing critical security concerns….

Pixnapping Attack Hijacks Google Authenticator 2FA Codes in Under 30 Seconds
15
Oct
2025

Pixnapping Attack Hijacks Google Authenticator 2FA Codes in Under 30 Seconds

Security researchers have unveiled a sophisticated new attack technique dubbed “Pixnapping” that can extract two-factor authentication codes from Google Authenticator…

Telegram Becomes the Nerve Center for Modern Hacktivist Operations
15
Oct
2025

Telegram Becomes the Nerve Center for Modern Hacktivist Operations

Telegram has solidified its position as the primary coordination hub for modern hacktivist operations, according to comprehensive research analyzing over…

NCSC Issues Warning as UK Sees Four Cyber Attacks a Week
15
Oct
2025

NCSC Issues Warning as UK Sees Four Cyber Attacks a Week

British organisations are facing an unprecedented cyber security crisis as the National Cyber Security Centre reveals a dramatic surge in…

Pro-Russian Hacktivists Target Government, Finance and E-Commerce Sites
15
Oct
2025

Pro-Russian Hacktivists Target Government, Finance and E-Commerce Sites

The pro-Russian hacktivist collective NoName057(16) has emerged as a notable participant in a coordinated wave of cyberattacks targeting Israeli infrastructure…