Category: GBHackers

Let’s Encrypt Launches 6-Day Certificates for IP-Based SSL Encryption
27
Jun
2025

Let’s Encrypt Launches 6-Day Certificates for IP-Based SSL Encryption

Let’s Encrypt, the world-renowned free Certificate Authority (CA), is on the verge of a significant milestone: issuing SSL/TLS certificates for…

APT-C-36 Hackers Launching Cyberattacks on Government Entities, Financial Sectors, and Critical Systems
27
Jun
2025

APT-C-36 Hackers Launching Cyberattacks on Government Entities, Financial Sectors, and Critical Systems

The cyber threat group APT-C-36, widely known as Blind Eagle, has been orchestrating sophisticated cyberattacks targeting a range of sectors…

Hackers Intensify Use of This Manipulative Technique to Deceive Users
27
Jun
2025

Hackers Intensify Use of This Manipulative Technique to Deceive Users

A novel social engineering technique dubbed “ClickFix” has surged by an alarming 517% between the second half of 2024 and…

Windows Says Goodbye to Blue Screen of Death, Introduces Black Screen
27
Jun
2025

Windows Says Goodbye to Blue Screen of Death, Introduces Black Screen

After nearly four decades as a symbol of frustration and failure for PC users worldwide, Microsoft is officially retiring the…

Mitsubishi Electric AC Flaw Lets Hackers Remotely Control Systems
27
Jun
2025

Mitsubishi Electric AC Flaw Lets Hackers Remotely Control Systems

A critical security vulnerability has been discovered in multiple Mitsubishi Electric air conditioning systems, potentially allowing hackers to bypass authentication…

University Student Charged for Alleged Hacking and Data Theft
27
Jun
2025

University Student Charged for Alleged Hacking and Data Theft

A 27-year-old former student of Western Sydney University has been charged with a string of cyber offences, following an extensive…

Pre-Auth Flaw in MongoDB Server Allows Attackers to Cause DoS
27
Jun
2025

Pre-Auth Flaw in MongoDB Server Allows Attackers to Cause DoS

A critical pre-authentication vulnerability (CVE-2025-6709) in MongoDB Server enables unauthenticated attackers to trigger denial-of-service (DoS) conditions by exploiting improper input…

Kansas City Man Pleads Guilty After Hacking to Promote His Cybersecurity Services
27
Jun
2025

Kansas City Man Pleads Guilty After Hacking to Promote His Cybersecurity Services

A Kansas City man has pleaded guilty to federal charges after admitting he hacked into the computer systems of multiple…

Open VSX Marketplace Flaw Enables Millions of Developers at Risk of Supply Chain Attacks
27
Jun
2025

Open VSX Marketplace Flaw Enables Millions of Developers at Risk of Supply Chain Attacks

A newly disclosed critical vulnerability in the Open VSX Registry, the open-source marketplace for Visual Studio Code (VS Code) extensions,…

Researchers Weaponize and Obfuscate .NET Assemblies Using MacroPack
26
Jun
2025

Researchers Weaponize and Obfuscate .NET Assemblies Using MacroPack

Researchers at BallisKit have introduced a sophisticated scenario within their MacroPack Pro tool to obfuscate and weaponize .NET assemblies, significantly…

IBM WebSphere Application Server Flaw Enables Arbitrary Code Execution
26
Jun
2025

IBM WebSphere Application Server Flaw Enables Arbitrary Code Execution

A severe security flaw has been identified in IBM WebSphere Application Server, potentially allowing remote attackers to execute arbitrary code…

Iranian APT35 Hackers Targeting High-Profile Cybersecurity Experts and Professors in Israel
26
Jun
2025

Iranian APT35 Hackers Targeting High-Profile Cybersecurity Experts and Professors in Israel

The Iranian threat group Educated Manticore, also tracked as APT35, APT42, Charming Kitten, or Mint Sandstorm, has intensified its cyber-espionage…