Category: GBHackers

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft
12
May
2025

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft

Distributed Denial of Service (DDoS) attacks, once seen as crude tools for disruption wielded by script kiddies and hacktivists, have…

Open Source Linux Firewall IPFire 2.29
12
May
2025

Open Source Linux Firewall IPFire 2.29

IPFire, the powerful open-source firewall, has unveiled its latest release, IPFire 2.29 – Core Update 194, packed with security enhancements,…

Mitel SIP Phone Flaws Allow Attackers to Inject Malicious Commands
12
May
2025

Mitel SIP Phone Flaws Allow Attackers to Inject Malicious Commands

A pair of vulnerabilities in Mitel’s 6800 Series, 6900 Series, and 6900w Series SIP Phones-including the 6970 Conference Unit-could enable…

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations
12
May
2025

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability in VMware Tools, tracked as CVE-2025-22247…

A Tool That Disables Windows Defender by Registering as an Antivirus
12
May
2025

A Tool That Disables Windows Defender by Registering as an Antivirus

Cybersecurity developers have released a new tool called “defendnot,” a successor to the previously DMCA-takedown-affected “no-defender” project. This innovative utility…

Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data
12
May
2025

Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data

Microsoft’s Copilot for SharePoint, designed to streamline enterprise collaboration through generative AI, has become an unexpected weapon for cybercriminals targeting…

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner
12
May
2025

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules, including a highly anticipated exploit…

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access
12
May
2025

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz Research. This operation zeroed in on…

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities
12
May
2025

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an innovative approach that leverages Mach Interprocess…

Cybercriminals Hide Undetectable Ransomware Inside JPG Images
12
May
2025

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files to deliver fully undetectable (FUD) ransomware,…

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps
12
May
2025

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps

Microsoft has announced the upcoming release of a groundbreaking “Prevent Screen Capture” feature for Teams, designed to block unauthorized screenshots…

New Exploit Method Extracts Microsoft Entra Tokens Through Beacon
12
May
2025

New Exploit Method Extracts Microsoft Entra Tokens Through Beacon

A novel exploit method leveraging Beacon Object Files (BOFs) has emerged, enabling attackers to extract Microsoft Entra (formerly Azure AD)…