Category: GBHackers

Microsoft to Block Exchange Online Access from Outdated Devices
18
Dec
2025

Microsoft to Block Exchange Online Access from Outdated Devices

Microsoft has announced a significant update to its device connectivity policies for Exchange Online, aimed at enhancing security and ensuring…

Nagios XI 2026R1.1 Released to Patch Privilege Escalation Vulnerability
18
Dec
2025

Nagios XI 2026R1.1 Released to Patch Privilege Escalation Vulnerability

Nagios has released version 2026R1.1 to address a critical privilege escalation vulnerability affecting earlier versions of its monitoring platform. The…

Singularity Linux Kernel Rootkit with klogctl Detection Evasion
18
Dec
2025

Singularity Linux Kernel Rootkit with klogctl Detection Evasion

Singularity, a stealth-focused Linux Kernel Module (LKM) rootkit targeting modern 6.x kernels, has added a powerful log‐evasion capability that prevents…

Chinese Hackers Turn Compromised Servers Into ShadowPad Nodes
18
Dec
2025

Chinese Hackers Turn Compromised Servers Into ShadowPad Nodes

A sophisticated Chinese threat actor tracked as Ink Dragon has been weaponizing a custom ShadowPad IIS Listener module to convert…

Hackers Can Seize Control of Car Dashboards Through Modem Vulnerabilities
17
Dec
2025

Hackers Can Seize Control of Car Dashboards Through Modem Vulnerabilities

Imagine cruising down the highway in your brand-new electric car when suddenly the multimedia display fills with Doom, the iconic…

Microsoft Desktop Window Manager Flaw Allows Privilege Escalation
17
Dec
2025

Microsoft Desktop Window Manager Flaw Allows Privilege Escalation

A critical vulnerability has been discovered in the Windows Desktop Window Manager (DWM) that could allow attackers to escalate privileges…

Kimsuky Hackers Use Weaponized QR Codes to Distribute Malicious Mobile Apps
17
Dec
2025

Kimsuky Hackers Use Weaponized QR Codes to Distribute Malicious Mobile Apps

Threat researchers have uncovered a sophisticated mobile malware campaign attributed to North Korea-linked threat actor Kimsuky, leveraging weaponized QR codes…

NVIDIA Isaac Lab Flaw Enables Remote Code Execution
17
Dec
2025

NVIDIA Isaac Lab Flaw Enables Remote Code Execution

NVIDIA has disclosed a critical security vulnerability in Isaac Lab, a component of the NVIDIA Isaac Sim framework, that could…

Chrome Security Update Fixes Remote Code Execution Flaws
17
Dec
2025

Chrome Security Update Fixes Remote Code Execution Flaws

Google has released an emergency security update for the Chrome browser, addressing two high-severity vulnerabilities that could enable remote code…

Blind Eagle Hackers Exploit Trust to Bypass Email Security Controls
17
Dec
2025

Blind Eagle Hackers Exploit Trust to Bypass Email Security Controls

BlindEagle threat actors are exploiting compromised internal email accounts to launch spear-phishing campaigns that bypass traditional email security controls, targeting…

CISA Alerts on Actively Exploited Gladinet CentreStack and Triofox Flaws
17
Dec
2025

CISA Alerts on Actively Exploited Gladinet CentreStack and Triofox Flaws

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert regarding a critical security vulnerability affecting Gladinet CentreStack…

Cellik Android Malware Uses One-Click APK Builder to Hide in Play Store Apps
17
Dec
2025

Cellik Android Malware Uses One-Click APK Builder to Hide in Play Store Apps

A newly discovered Android Remote Access Trojan (RAT) called Cellik is democratizing sophisticated mobile surveillance attacks by bundling advanced spyware…