Category: GBHackers

Progress Releases Patch for MOVEit Transfer Resource Consumption Flaw
31
Oct
2025

Progress Releases Patch for MOVEit Transfer Resource Consumption Flaw

Progress Software has released security patches to address a high-severity vulnerability in its MOVEit Transfer platform discovered on October 29,…

Windows LNK UI Spoofing Vulnerability Weaponized for Remote Code Execution
31
Oct
2025

Windows LNK UI Spoofing Vulnerability Weaponized for Remote Code Execution

A sophisticated cyber espionage campaign targeting European diplomatic institutions has been uncovered, signaling a strategic escalation by Chinese-affiliated threat actor…

Kimsuky and Lazarus Hackers Deploy New Backdoor Tools for Remote Access Attacks
31
Oct
2025

Kimsuky and Lazarus Hackers Deploy New Backdoor Tools for Remote Access Attacks

North Korean state-sponsored threat actors have escalated their cyber operations with the deployment of sophisticated new malware variants designed to…

Massive Great Firewall Leak Exposes 500GB of Censorship Data
31
Oct
2025

Massive Great Firewall Leak Exposes 500GB of Censorship Data

In a historic breach of China’s censorship infrastructure, over 500 gigabytes of internal data were leaked from Chinese infrastructure firms…

New Agent-Aware Cloaking Technique Uses ChatGPT Atlas Browser to Feed Fake Content
31
Oct
2025

New Agent-Aware Cloaking Technique Uses ChatGPT Atlas Browser to Feed Fake Content

Security researchers have uncovered a sophisticated attack vector that exploits how AI search tools and autonomous agents retrieve web content….

CISA Publishes New Guidance to Strengthen Microsoft Exchange Server Security
31
Oct
2025

CISA Publishes New Guidance to Strengthen Microsoft Exchange Server Security

The Cybersecurity and Infrastructure Security Agency (CISA), working alongside the National Security Agency and international cybersecurity partners, has released a…

Multi-Threaded C2 Steals Windows Logins
30
Oct
2025

Multi-Threaded C2 Steals Windows Logins

Cybersecurity researchers have uncovered a sophisticated Windows malware family dubbed Airstalk, which leverages legitimate mobile device management infrastructure to establish…

Aembit Introduces Identity and Access Management for Agentic AI
30
Oct
2025

Aembit Introduces Identity and Access Management for Agentic AI

Silver Spring, USA/ Maryland, October 30th, 2025, CyberNewsWire The new capabilities, anchored by Blended Identity and the MCP Identity Gateway,…

Critical Blink Vulnerability Lets Attackers Crash Chromium Browsers in Seconds
30
Oct
2025

Critical Blink Vulnerability Lets Attackers Crash Chromium Browsers in Seconds

Security researchers have discovered a critical architectural flaw in the Blink rendering engine that powers Chromium-based browsers, exposing over 3…

Threat Actors Abuse AzureHound Tool to Enumerate Azure and Entra ID Environments
30
Oct
2025

Threat Actors Abuse AzureHound Tool to Enumerate Azure and Entra ID Environments

The cybersecurity landscape continues to shift toward cloud-based attacks, with threat actors increasingly exploiting legitimate security tools for malicious reconnaissance….

Lampion Stealer Resurfaces with ClickFix Attack to Steal User Credentials Stealthily
30
Oct
2025

Lampion Stealer Resurfaces with ClickFix Attack to Steal User Credentials Stealthily

A Brazilian cybercriminal group has refined its long-running malware distribution campaign by incorporating innovative social engineering techniques and multi-stage infection…

Jenkins Flaws Expose SAML Authentication Bypass and MCP Server Plugin Weaknesses
30
Oct
2025

Jenkins Flaws Expose SAML Authentication Bypass and MCP Server Plugin Weaknesses

Jenkins automation server users face critical security threats following the disclosure of 14 distinct vulnerabilities spanning multiple plugins. The security…