Category: GBHackers

Critical Roundcube Flaw Allows Remote Code Execution by Attackers
02
Jun
2025

Critical Roundcube Flaw Allows Remote Code Execution by Attackers

Roundcube Webmail, one of the most widely used browser-based IMAP clients, has released urgent security updates for its 1.6 and…

Active Exploits Detected Targeting Critical vBulletin Vulnerability
02
Jun
2025

Active Exploits Detected Targeting Critical vBulletin Vulnerability

Two critical vulnerabilities—CVE-2025-48827 and CVE-2025-48828—have been assigned to vBulletin, the widely used PHP/MySQL forum software, following public disclosure and observed…

Severe Vulnerabilities in Consilium CS5000 Fire Panels Allow Remote System Takeover
02
Jun
2025

Severe Vulnerabilities in Consilium CS5000 Fire Panels Allow Remote System Takeover

Two severe cybersecurity vulnerabilities have been disclosed in the Consilium Safety CS5000 Fire Panel, a widely deployed industrial control system…

MITRE Releases Roadmap for Transition to Post-Quantum Cryptography
02
Jun
2025

MITRE Releases Roadmap for Transition to Post-Quantum Cryptography

The nonprofit research organization MITRE has unveiled a comprehensive roadmap designed to guide organizations through the critical transition from current…

Windows 11 Security Update for 22H2 & 23H2 May Cause Recovery Errors
30
May
2025

Windows 11 Security Update for 22H2 & 23H2 May Cause Recovery Errors

A recent Windows 11 security update, KB5058405, released on May 13, 2025, has caused significant boot failures for some users…

Hackers Use Gh0st RAT to Hijack Internet Café Systems for Crypto Mining
30
May
2025

Hackers Use Gh0st RAT to Hijack Internet Café Systems for Crypto Mining

Hackers have been targeting Internet cafés in South Korea since the second half of 2024, exploiting specialized management software to…

Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks
30
May
2025

Microsoft Reveals Techniques for Defending Against Evolving AiTM Attacks

Microsoft has exposed the escalating sophistication of phishing attacks, particularly focusing on Adversary-in-the-Middle (AiTM) techniques that are becoming a cornerstone…

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges
30
May
2025

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges

A recent discovery by security researchers at BeyondTrust has revealed a critical, yet by-design, security gap in Microsoft Entra ID…

Weaponized AI Tool Installers Infect Devices with Ransomware
30
May
2025

Weaponized AI Tool Installers Infect Devices with Ransomware

Cisco Talos has uncovered a series of malicious threats masquerading as legitimate AI tool installers, targeting unsuspecting users and businesses…

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments
30
May
2025

Attackers Exploit Microsoft Entra Billing Roles to Escalate Privileges in Organizational Environments

A startling discovery by BeyondTrust researchers has unveiled a critical vulnerability in Microsoft Entra ID and Azure environments, where attackers…

Threat Actors Exploit Google Apps Script to Host Phishing Sites
30
May
2025

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google Apps Script a legitimate development…

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials
30
May
2025

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by the notorious hacker group Storm-1575,…