Category: GBHackers

Elastic Cloud Enterprise Flaw Lets Attackers Run Malicious Commands
14
Oct
2025

Elastic Cloud Enterprise Flaw Lets Attackers Run Malicious Commands

Elastic has released a critical security update for Elastic Cloud Enterprise (ECE) addressing a template engine injection flaw that could…

Threat Actors Exploit ScreenConnect to Gain Unauthorized Remote Access
14
Oct
2025

Threat Actors Exploit ScreenConnect to Gain Unauthorized Remote Access

A recent surge in threat actors leveraging remote management and monitoring (RMM) tools for initial access has intensified scrutiny of…

Ivanti Patches 13 Endpoint Manager Flaws Allowing Remote Code Execution
14
Oct
2025

Ivanti Patches 13 Endpoint Manager Flaws Allowing Remote Code Execution

Ivanti has disclosed 13 vulnerabilities in Ivanti Endpoint Manager (EPM), including two high-severity issues that could enable privilege escalation and…

TA585 Deploys Novel Web-Injection to Deliver MonsterV2 Malware on Windows
14
Oct
2025

TA585 Deploys Novel Web-Injection to Deliver MonsterV2 Malware on Windows

As cybercrime continues to evolve, new adversaries and innovative tactics challenge defenders daily. The recently emerged threat group TA585 exemplifies…

Simple Prompt Injection Lets Hackers Bypass OpenAI Guardrails Framework
14
Oct
2025

Simple Prompt Injection Lets Hackers Bypass OpenAI Guardrails Framework

Security researchers have discovered a fundamental vulnerability in OpenAI’s newly released Guardrails framework that can be exploited using basic prompt…

Clevo UEFI Leak Allows Signing of Malicious Firmware with BootGuard Keys
14
Oct
2025

Clevo UEFI Leak Allows Signing of Malicious Firmware with BootGuard Keys

Clevo accidentally exposed private keys used in its Intel Boot Guard implementation, allowing attackers to sign malicious firmware that would…

Hackers Exploit Microsoft Edge’s Internet Explorer Mode to Compromise User Devices
13
Oct
2025

Hackers Exploit Microsoft Edge’s Internet Explorer Mode to Compromise User Devices

Microsoft Edge has identified and mitigated a critical threat exploiting its Internet Explorer (IE) compatibility mode, closing off high-risk entry…

Technical Mechanics and Forensic Artifacts Exposed
13
Oct
2025

Technical Mechanics and Forensic Artifacts Exposed

EDR-Freeze is a proof-of-concept tool that forces endpoint detection and response (EDR) or antivirus processes into a temporary “coma.” Instead of…

Pro-Russian Hacktivist Targets OT/ICS Systems to Harvest Credentials
13
Oct
2025

Pro-Russian Hacktivist Targets OT/ICS Systems to Harvest Credentials

In September, a nascent pro-Russian hacktivist group known as TwoNet staged its first operational technology and industrial control systems (OT/ICS)…

13
Oct
2025

Pro-Russian Hacktivist Targets OT/ICS Systems to Harvest Credentials

In September, a nascent pro-Russian hacktivist group known as TwoNet staged its first operational technology and industrial control systems (OT/ICS)…

Russian Cybercrime Marketplace Shifting from RDP Access to Malware Stealer Log Exploits
13
Oct
2025

Russian Cybercrime Marketplace Shifting from RDP Access to Malware Stealer Log Exploits

The online cybercrime marketplace, Russian Market, has evolved from selling Remote Desktop Protocol (RDP) access to becoming one of the…

Hackers Target macOS Users with Fake Homebrew Websites to Deliver Malicious Payloads
13
Oct
2025

Hackers Target macOS Users with Fake Homebrew Websites to Deliver Malicious Payloads

In September 2025, Kandji’s security researchers uncovered a sophisticated campaign in which attackers deployed multiple spoofed Homebrew installer sites that…