Category: GBHackers

UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops
15
Oct
2025

UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops

Security researchers have uncovered critical vulnerabilities in signed UEFI shells that allow attackers to completely bypass Secure Boot protections on…

Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence
15
Oct
2025

Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence

The China-backed advanced persistent threat group Flax Typhoon maintained year-long access to an ArcGIS system by turning trusted software into…

End of Support for Windows 10 Sparks Security Fears Among Millions of Users
15
Oct
2025

End of Support for Windows 10 Sparks Security Fears Among Millions of Users

Microsoft officially ended support for Windows 10 on October 14, 2025, leaving millions of users worldwide facing critical security concerns….

Pixnapping Attack Hijacks Google Authenticator 2FA Codes in Under 30 Seconds
15
Oct
2025

Pixnapping Attack Hijacks Google Authenticator 2FA Codes in Under 30 Seconds

Security researchers have unveiled a sophisticated new attack technique dubbed “Pixnapping” that can extract two-factor authentication codes from Google Authenticator…

Telegram Becomes the Nerve Center for Modern Hacktivist Operations
15
Oct
2025

Telegram Becomes the Nerve Center for Modern Hacktivist Operations

Telegram has solidified its position as the primary coordination hub for modern hacktivist operations, according to comprehensive research analyzing over…

NCSC Issues Warning as UK Sees Four Cyber Attacks a Week
15
Oct
2025

NCSC Issues Warning as UK Sees Four Cyber Attacks a Week

British organisations are facing an unprecedented cyber security crisis as the National Cyber Security Centre reveals a dramatic surge in…

Pro-Russian Hacktivists Target Government, Finance and E-Commerce Sites
15
Oct
2025

Pro-Russian Hacktivists Target Government, Finance and E-Commerce Sites

The pro-Russian hacktivist collective NoName057(16) has emerged as a notable participant in a coordinated wave of cyberattacks targeting Israeli infrastructure…

Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report
14
Oct
2025

Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report

Tel Aviv, Israel, October 14th, 2025, CyberNewsWire Sweet Security, a leader in Runtime Cloud and AI security solutions, today announced…

Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore
14
Oct
2025

Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore

Torrance, United States, October 14th, 2025, CyberNewsWire Criminal IP at Booth J30 | Sands Expo Singapore | October 21 –…

Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack
14
Oct
2025

Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack

Luxembourg, October 14th, 2025, CyberNewsWire Surge in scale and sophistication highlights rising threats to tech and digital infrastructure Gcore, the…

PolarEdge C2 Communication via Custom Binary Protocol with Custom TLS Server
14
Oct
2025

PolarEdge C2 Communication via Custom Binary Protocol with Custom TLS Server

In early 2025, security researchers unveiled a sophisticated botnet implant named PolarEdge, which relies on a bespoke TLS server and…

Hackers Use Court-Themed Phishing to Deliver Info-Stealer Malware
14
Oct
2025

Hackers Use Court-Themed Phishing to Deliver Info-Stealer Malware

A novel phishing campaign has emerged targeting Colombian users by abusing judicial notifications and weaponizing Scalable Vector Graphics (SVG) files….