Category: GBHackers

Microsoft Issues Urgent Patch to Resolve BitLocker Recovery Problem
20
May
2025

Microsoft Issues Urgent Patch to Resolve BitLocker Recovery Problem

Microsoft has released an emergency update to address a critical issue affecting Windows 10 devices with specific Intel processors. The…

O2 VoLTE Flaw Allows Tracking of Customers’ Locations Through Phone Calls
20
May
2025

O2 VoLTE Flaw Allows Tracking of Customers’ Locations Through Phone Calls

Significant privacy vulnerability in O2 UK’s Voice over LTE (VoLTE) implementation was recently discovered, allowing any caller to access precise…

Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features
20
May
2025

Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features

Tor Project has launched Tor Browser 14.5.2, a significant update addressing security vulnerabilities, refining cross-platform functionality, and enhancing build system…

Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code
20
May
2025

Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code

Security researchers have uncovered three critical vulnerabilities in pfSense firewall software that could allow attackers to inject malicious code, corrupt…

CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog
20
May
2025

CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog

Cybersecurity and Infrastructure Security Agency (CISA) has added two critical zero-day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) to its…

Investigating Cobalt Strike Beacons Using Shodan: A Researcher’s Guide
20
May
2025

Investigating Cobalt Strike Beacons Using Shodan: A Researcher’s Guide

Security researcher has revealed a robust method for gathering threat intelligence on Cobalt Strike beacons using Shodan and PowerShell, filling…

Cache Timing Techniques Used to Bypass Windows 11 KASLR and Reveal Kernel Base
20
May
2025

Cache Timing Techniques Used to Bypass Windows 11 KASLR and Reveal Kernel Base

Cache timing side-channel attacks have been used to circumvent Kernel Address Space Layout Randomization (KASLR) on fully updated Windows 11…

Chinese APT Hackers Target Organizations Using Korplug Loaders and Malicious USB Drives
20
May
2025

Chinese APT Hackers Target Organizations Using Korplug Loaders and Malicious USB Drives

Advanced persistent threat (APT) groups with ties to China have become persistent players in the cyber espionage landscape, with a…

New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials
20
May
2025

New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials

A newly identified phishing campaign is targeting unsuspecting users by masquerading as urgent Zoom meeting invitations from colleagues. This deceptive…

New Hannibal Stealer Uses Stealth and Obfuscation to Evade Detection
19
May
2025

New Hannibal Stealer Uses Stealth and Obfuscation to Evade Detection

A newly identified piece of malware, dubbed the “Hannibal Stealer,” has emerged as a significant cybersecurity threat due to its…

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News
19
May
2025

Hacker Arrested for Taking Over SEC Social Media to Spread False Bitcoin News

Alabama man has been sentenced to 14 months in prison for orchestrating a sophisticated SIM swap attack that allowed him…

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year
19
May
2025

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands, Germany, France, Belgium, and Ireland—reported having…