Category: GBHackers

Microsoft Windows Defender Firewall Vulnerabilities Allow Privilege Escalation
12
Sep
2025

Microsoft Windows Defender Firewall Vulnerabilities Allow Privilege Escalation

Microsoft has released security advisories for four newly discovered vulnerabilities in its Windows Defender Firewall Service that could enable attackers…

New Malware Abuses Azure Functions to Host Command and Control Infrastructure
12
Sep
2025

New Malware Abuses Azure Functions to Host Command and Control Infrastructure

A malicious ISO image named Servicenow-BNM-Verify.iso was uploaded to VirusTotal from Malaysia with almost no detections. The image contains four…

12
Sep
2025

New Malvertising Campaign Exploits GitHub Repositories to Distribute Malware

A sophisticated malvertising campaign has been uncovered targeting unsuspecting users through “dangling commits” in a legitimate GitHub repository. Attackers are…

Axios Vulnerability Enables Attackers to Crash Node.js Applications via Data Handle Abuse
12
Sep
2025

Axios Vulnerability Enables Attackers to Crash Node.js Applications via Data Handle Abuse

A critical security vulnerability has been discovered in the popular Axios HTTP client library that allows attackers to crash Node.js…

Buterat Backdoor Campaigns Targeting Enterprise Endpoint Control
12
Sep
2025

Buterat Backdoor Campaigns Targeting Enterprise Endpoint Control

Backdoor malware is a covert type of malicious software designed to bypass standard authentication mechanisms and provide persistent, unauthorized access…

Malware Campaign Uses SVG Email Attachments to Deploy XWorm and Remcos RAT
12
Sep
2025

Malware Campaign Uses SVG Email Attachments to Deploy XWorm and Remcos RAT

Recent threat campaigns have revealed an evolving use of BAT-based loaders to deliver Remote Access Trojans (RATs), including XWorm and…

Sidewinder Hackers Exploit LNK Files to Deploy Malicious Scripts
12
Sep
2025

Sidewinder Hackers Exploit LNK Files to Deploy Malicious Scripts

In a striking evolution of its tactics, the Sidewinder advanced persistent threat (APT) group—also known as APT-C-24 or “Rattlesnake”—has adopted…

Microsoft to Deprecate VBScript in Windows, Urges Developers to Update Projects
12
Sep
2025

Microsoft to Deprecate VBScript in Windows, Urges Developers to Update Projects

Microsoft announced the phased deprecation of VBScript in Windows, significantly impacting VBA developers who rely on VBScript libraries for regular…

LAPSUS$ Hunters 4.0 Announce Permanent Shutdown
12
Sep
2025

LAPSUS$ Hunters 4.0 Announce Permanent Shutdown

In a startling development on September 8, the Telegram channel “scattered LAPSUS$ hunters 4.0” declared its intention to “go dark”…

New K2 Think AI Model Falls to Jailbreak in Record Time
12
Sep
2025

New K2 Think AI Model Falls to Jailbreak in Record Time

A groundbreaking vulnerability has emerged in the newly released K2 Think AI model from UAE’s Mohamed bin Zayed University of…

New ToneShell Variant Uses Task Scheduler COM Service to Maintain Persistence
12
Sep
2025

New ToneShell Variant Uses Task Scheduler COM Service to Maintain Persistence

The latest ToneShell variant introduces a notable advancement in its persistence strategy by leveraging the Windows Task Scheduler COM service….

Daikin Security Gateway Vulnerability Allows Unauthorized System Access
12
Sep
2025

Daikin Security Gateway Vulnerability Allows Unauthorized System Access

A critical security flaw in Daikin Security Gateway systems has been discovered that could enable attackers to bypass authentication and…