Category: GBHackers

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations
12
May
2025

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability in VMware Tools, tracked as CVE-2025-22247…

A Tool That Disables Windows Defender by Registering as an Antivirus
12
May
2025

A Tool That Disables Windows Defender by Registering as an Antivirus

Cybersecurity developers have released a new tool called “defendnot,” a successor to the previously DMCA-takedown-affected “no-defender” project. This innovative utility…

Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data
12
May
2025

Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data

Microsoft’s Copilot for SharePoint, designed to streamline enterprise collaboration through generative AI, has become an unexpected weapon for cybercriminals targeting…

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner
12
May
2025

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules, including a highly anticipated exploit…

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access
12
May
2025

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz Research. This operation zeroed in on…

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities
12
May
2025

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an innovative approach that leverages Mach Interprocess…

Cybercriminals Hide Undetectable Ransomware Inside JPG Images
12
May
2025

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files to deliver fully undetectable (FUD) ransomware,…

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps
12
May
2025

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps

Microsoft has announced the upcoming release of a groundbreaking “Prevent Screen Capture” feature for Teams, designed to block unauthorized screenshots…

New Exploit Method Extracts Microsoft Entra Tokens Through Beacon
12
May
2025

New Exploit Method Extracts Microsoft Entra Tokens Through Beacon

A novel exploit method leveraging Beacon Object Files (BOFs) has emerged, enabling attackers to extract Microsoft Entra (formerly Azure AD)…

Google Chrome Uses Advanced AI to Combat Sophisticated Online Scams
11
May
2025

Google Chrome Uses Advanced AI to Combat Sophisticated Online Scams

Google has integrated artificial intelligence into its cybersecurity toolkit to shield users from financial and data theft scams. On Friday,…

DOGE Employee Computer Infected with Malware and Leaked Data Found Info-Stealer Logs
10
May
2025

DOGE Employee Computer Infected with Malware and Leaked Data Found Info-Stealer Logs

Kyle Schutt, a 37-year-old DOGE employee identified in federal payroll records, has had his personal email address and associated passwords…

Bluetooth Core 6.1 Released - What's New!
10
May
2025

Bluetooth Core 6.1 Released – What’s New!

Bluetooth SIG’s decision to transition to a bi-annual release cadence marks a strategic pivot toward fostering rapid iteration and market…