Category: GBHackers

Notepad++ Vulnerability Allows Full System Takeover — PoC Released
24
Jun
2025

Notepad++ Vulnerability Allows Full System Takeover — PoC Released

A critical privilege escalation vulnerability (CVE-2025-49144) in Notepad++ v8.8.1 enables attackers to achieve full system control through a supply-chain attack….

New Echo Chamber Attack Breaks AI Models Using Indirect Prompts
24
Jun
2025

New Echo Chamber Attack Breaks AI Models Using Indirect Prompts

A groundbreaking AI jailbreak technique, dubbed the “Echo Chamber Attack,” has been uncovered by researchers at Neural Trust, exposing a…

RapperBot Targets DVRs to Hijack Surveillance Cameras and Record Video
24
Jun
2025

RapperBot Targets DVRs to Hijack Surveillance Cameras and Record Video

When the NICT CSRI analysis team presented their three-year investigation into the RapperBot virus at Botconf 1, an international conference…

1inch rolls out expanded bug bounties with rewards up to $500K
24
Jun
2025

1inch rolls out expanded bug bounties with rewards up to $500K

Five dedicated bug bounty programs upgraded across 1inch core components, including smart contracts, wallet and infrastructure. A community-first approach to…

Google Integrates GenAI to Counter Indirect Prompt Injection Attack Vectors
24
Jun
2025

Google Integrates GenAI to Counter Indirect Prompt Injection Attack Vectors

Google has revealed a thorough protection technique aimed at indirect prompt injection attacks, a subtle but powerful threat, marking a…

UAC-0001 Hackers Target ICS Devices Running Windows-Based Server Systems
23
Jun
2025

UAC-0001 Hackers Target ICS Devices Running Windows-Based Server Systems

The national team for responding to cyber incidents, CERT-UA, has exposed a sophisticated cyberattack targeting the information and communication system…

APT36 Hackers Target Indian Defense Personnel with Sophisticated Phishing Campaign
23
Jun
2025

APT36 Hackers Target Indian Defense Personnel with Sophisticated Phishing Campaign

APT36, also known as Transparent Tribe, a Pakistan-based cyber espionage group, has launched a highly sophisticated phishing campaign targeting Indian…

Shadow Vector Malware Uses SVG Images to Deliver AsyncRAT and RemcosRAT Payloads
23
Jun
2025

Shadow Vector Malware Uses SVG Images to Deliver AsyncRAT and RemcosRAT Payloads

Acronis Threat Research Unit (TRU) has discovered a startling development: a malicious campaign called “Shadow Vector” is actively targeting Colombian…

Microsoft Enhances Defender for Office 365 with Detailed Spam and Phishing Analysis
23
Jun
2025

Microsoft Enhances Defender for Office 365 with Detailed Spam and Phishing Analysis

Microsoft has announced a significant upgrade to its Defender for Office 365 platform, introducing a new AI-powered capability designed to…

NCSC Issues Alert on 'UMBRELLA STAND' Malware Targeting Fortinet FortiGate Firewalls
23
Jun
2025

NCSC Issues Alert on ‘UMBRELLA STAND’ Malware Targeting Fortinet FortiGate Firewalls

The National Cyber Security Centre (NCSC) has sounded the alarm over a newly identified malware dubbed “UMBRELLA STAND,” specifically targeting…

Critical Teleport Vulnerability Allows Remote Authentication Bypass
23
Jun
2025

Critical Teleport Vulnerability Allows Remote Authentication Bypass

A critical security vulnerability, tracked as CVE-2025-49825, has been discovered in Teleport, a widely used open-source platform for secure access…

North Korean Hackers Weaponize GitHub Infrastructure to Distribute Malware
23
Jun
2025

North Korean Hackers Weaponize GitHub Infrastructure to Distribute Malware

Cybersecurity researchers have uncovered a sophisticated spearphishing campaign orchestrated by the North Korean threat group Kimsuky, leveraging GitHub as a…