Category: GBHackers

Exploiting dMSA for Advanced Active Directory Persistence
19
May
2025

Exploiting dMSA for Advanced Active Directory Persistence

Security researchers have identified new methods for achieving persistence in Active Directory environments by exploiting Delegated Managed Service Accounts (dMSAs),…

Critical glibc Flaw Puts Millions of Linux Systems at Risk
19
May
2025

Critical glibc Flaw Puts Millions of Linux Systems at Risk

Security researchers have disclosed a significant vulnerability in the GNU C Library (glibc), potentially affecting millions of Linux systems worldwide….

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked
17
May
2025

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering critical vulnerabilities across major enterprise platforms…

Chinese Agent Impersonate as Stanford student For Intelligence Gathering
16
May
2025

Chinese Agent Impersonate as Stanford student For Intelligence Gathering

Chinese intelligence operative posing as a Stanford University student has been uncovered following an investigation into suspicious approaches made to…

Printer Company Distributes Malicious Drivers Infected with XRed Malware
16
May
2025

Printer Company Distributes Malicious Drivers Infected with XRed Malware

Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious code, including the notorious XRed backdoor…

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads
16
May
2025

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through a highly sophisticated phishing-based attack. Cybersecurity…

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication
16
May
2025

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign embedded within the seemingly innocuous package…

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack
16
May
2025

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for WordPress, was recently discovered by Denver…

Ivanti Endpoint Manager Vulnerabilities Allow Unauthenticated Remote Code Execution
16
May
2025

Ivanti Endpoint Manager Vulnerabilities Allow Unauthenticated Remote Code Execution

Critical vulnerability chain in Ivanti Endpoint Manager Mobile (EPMM) has exposed enterprise mobile device management systems to pre-authenticated remote code…

SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign
16
May
2025

SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign

A meticulously orchestrated phishing campaign targeting Kuwait’s fisheries, telecommunications, and insurance sectors has been exposed by Hunt.io researchers, revealing a…

Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia
16
May
2025

Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia

Andrei Vladimirovich Tarasov, a 33-year-old Russian cybercrime figure known online as “Aels,” has returned to Russia after evading US extradition….

Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key
16
May
2025

Windows 10 KB5058379 Update Causes PCs to Enter Recovery Mode and Prompt for BitLocker Key

Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical issues for numerous systems. Users report…