Category: GBHackers

Kali Linux 2025.4 Released Featuring 3 New Hacking Tools and Wifipumpkin3
14
Dec
2025

Kali Linux 2025.4 Released Featuring 3 New Hacking Tools and Wifipumpkin3

The release of Kali Linux 2025.4 marks a significant milestone for the ethical hacking distribution, bringing major architectural changes and a suite…

Apple Confirms Zero-Day Exploitation in Targeted Attacks on iPhone Users
14
Dec
2025

Apple Confirms Zero-Day Exploitation in Targeted Attacks on iPhone Users

Apple has issued critical security patches addressing two actively exploited zero-day vulnerabilities affecting iPhone and iPad devices. The tech giant…

Empire 6.3.0 Released as Updated Post-Exploitation Framework for Red Teams
13
Dec
2025

Empire 6.3.0 Released as Updated Post-Exploitation Framework for Red Teams

Researcher has officially released Empire 6.3.0, a significant update to the widely used post-exploitation and adversary emulation framework designed for Red Teams…

Researchers and Developers Targeted in AI-Driven GitHub Supply Chain Attack
13
Dec
2025

Researchers and Developers Targeted in AI-Driven GitHub Supply Chain Attack

A sophisticated AI-generated supply chain attack is targeting researchers, developers, and security professionals through compromised GitHub repositories, according to findings…

Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files
13
Dec
2025

Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files

Seqrite Labs has uncovered an active Russian phishing campaign that delivers Phantom information-stealing malware through malicious ISO files embedded in…

ConsentFix Attack Lets Hackers Hijack Microsoft Accounts via Azure CLI Abuse
13
Dec
2025

ConsentFix Attack Lets Hackers Hijack Microsoft Accounts via Azure CLI Abuse

Security researchers at Push have identified a sophisticated new phishing attack termed “ConsentFix,” which combines OAuth consent manipulation with ClickFix-style…

New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users
13
Dec
2025

New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users

Cybersecurity researchers at Datadog have uncovered a sophisticated adversary-in-the-middle phishing campaign targeting organizations that use Microsoft 365 and Okta for…

10,000+ Docker Hub Images Exposed with Live Production Credentials from 100+ Firms
13
Dec
2025

10,000+ Docker Hub Images Exposed with Live Production Credentials from 100+ Firms

A comprehensive security analysis has uncovered a critical vulnerability in container image distribution: more than 10,000 Docker Hub images containing…

CISA Alerts on Active Exploitation of Windows Cloud Files Mini Filter 0-Day
13
Dec
2025

CISA Alerts on Active Exploitation of Windows Cloud Files Mini Filter 0-Day

A critical privilege escalation vulnerability in Microsoft Windows Cloud Files Mini Filter Driver is now under active exploitation, according to…

Researchers Revive 2000s 'Blinkenlights' to Extract Smartwatch Firmware via Screen Pixels
13
Dec
2025

Researchers Revive 2000s ‘Blinkenlights’ to Extract Smartwatch Firmware via Screen Pixels

Security researchers have successfully extracted firmware from a cheap JieLi-based smartwatch by reviving an obscure 2000s attack technique that transmits…

CISA Issues New Guidance for Securing UEFI Secure Boot on Enterprise Devices
12
Dec
2025

CISA Issues New Guidance for Securing UEFI Secure Boot on Enterprise Devices

The Cybersecurity and Infrastructure Security Agency has released critical guidance on managing UEFI Secure Boot configurations across enterprise systems. The…

Research Findings on the Fate of Data Stolen in Phishing Attacks
12
Dec
2025

Research Findings on the Fate of Data Stolen in Phishing Attacks

New research from Kaspersky has mapped the complete lifecycle of data stolen during phishing attacks, revealing a sophisticated “shadow market…