Category: GBHackers

Windows 11 Security Update for 22H2 & 23H2 May Cause Recovery Errors
30
May
2025

Windows 11 Security Update for 22H2 & 23H2 May Cause Recovery Errors

A recent Windows 11 security update, KB5058405, released on May 13, 2025, has caused significant boot failures for some users…

Hackers Use Gh0st RAT to Hijack Internet Café Systems for Crypto Mining
30
May
2025

Hackers Use Gh0st RAT to Hijack Internet Café Systems for Crypto Mining

Hackers have been targeting Internet cafés in South Korea since the second half of 2024, exploiting specialized management software to…

Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks
30
May
2025

Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks

Microsoft has exposed the escalating sophistication of phishing attacks, particularly focusing on Adversary-in-the-Middle (AiTM) techniques that are becoming a cornerstone…

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges
30
May
2025

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges

A recent discovery by security researchers at BeyondTrust has revealed a critical, yet by-design, security gap in Microsoft Entra ID…

Weaponized AI Tool Installers Infect Devices with Ransomware
30
May
2025

Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers, targeting unsuspecting users and businesses…

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments
30
May
2025

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra ID and Azure environments, where attackers…

Threat Actors Exploit Google Apps Script to Host Phishing Sites
30
May
2025

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google Apps Script a legitimate development…

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials
30
May
2025

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by the notorious hacker group Storm-1575,…

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features
30
May
2025

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features

Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for threat actors targeting Windows-based systems…

Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates
30
May
2025

Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates

A critical vulnerability (CVE-2025-48057) has been discovered in Icinga 2, the widely used open-source monitoring platform. The flaw, affecting installations…

Dark Partner Hackers Leverage Fake AI, VPN, and Crypto Sites to Target macOS and Windows Users
30
May
2025

Dark Partner Hackers Leverage Fake AI, VPN, and Crypto Sites to Target macOS and Windows Users

A group dubbed “Dark Partners” by cybersecurity researchers has launched a sophisticated malware campaign targeting both macOS and Windows users…

Criminal IP Set to Make Its Debut at Infosecurity Europe 2025
30
May
2025

Criminal IP Set to Make Its Debut at Infosecurity Europe 2025

Criminal IP, the AI-powered threat intelligence platform developed by AI SPERA (led by CEO Byungtak Kang), has announced its first…