Category: GBHackers

Hackers Exploit Windows Remote Management to Evade Detection in AD Networks
09
May
2025

Hackers Exploit Windows Remote Management to Evade Detection in AD Networks

A new wave of cyberattacks is targeting Active Directory (AD) environments by abusing Windows Remote Management (WinRM), a legitimate administrative…

Hackers Exploit Host Header Injection to Breach Web Applications
09
May
2025

Hackers Exploit Host Header Injection to Breach Web Applications

Cybersecurity researchers have reported a significant rise in web breaches triggered by a lesser-known technique: Host Header Injection. This sophisticated…

Researchers Uncover Remote Code Execution Flaw in macOS
09
May
2025

Researchers Uncover Remote Code Execution Flaw in macOS

Security researchers Nikolai Skliarenko and Yazhi Wang of Trend Micro’s Research Team have disclosed critical details about CVE-2024-44236, a memory…

Play Ransomware Deployed in the Wild Exploiting Windows 0-Day Vulnerability
09
May
2025

Play Ransomware Deployed in the Wild Exploiting Windows 0-Day Vulnerability

Patched Windows zero-day vulnerability (CVE-2025-29824) in the Common Log File System (CLFS) driver was exploited in attacks linked to the…

Fedora Linux Joins the Windows Subsystem for Linux Officially
09
May
2025

Fedora Linux Joins the Windows Subsystem for Linux Officially

Fedora Project has announced the official availability of Fedora Linux on the Windows Subsystem for Linux (WSL), marking a significant…

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks
09
May
2025

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and home users: cybercriminals are actively exploiting…

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access
09
May
2025

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s AI and High-Performance Computing (HPC) workloads…

Guess Which Browser Tops the List for Data Collection!
09
May
2025

Guess Which Browser Tops the List for Data Collection!

Google Chrome has emerged as the undisputed champion of data collection among 10 popular web browsers studied on the Apple…

New Attack Exploits X/Twitter Ad URL Feature to Deceive Users
08
May
2025

New Attack Exploits X/Twitter Ad URL Feature to Deceive Users

Silent Push Threat Analysts have recently exposed a sophisticated financial scam leveraging a vulnerability in X/Twitter’s advertising display URL feature…

ESET Reveals How to Spot Fake Calls Demanding Payment for ‘Missed Jury Duty’
08
May
2025

ESET Reveals How to Spot Fake Calls Demanding Payment for ‘Missed Jury Duty’

ESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls purportedly from government officials demanding…

Microsoft Azure Integrates Google’s A2A Protocol for Effortless AI Agent Communication
08
May
2025

Microsoft Azure Integrates Google’s A2A Protocol for Effortless AI Agent Communication

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in collaboration with industry partners including…

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks
08
May
2025

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features (SISF) of multiple software platforms…