Category: GBHackers

Happy Birthday Linux! 34 Years of Open-Source Power
25
Aug
2025

Happy Birthday Linux! 34 Years of Open-Source Power

August 25, 2025, marks the 34th anniversary of Linux, a project that began as a modest hobby and has grown…

25
Aug
2025

Hackers Steal Windows Secrets and Credentials Undetected by EDR Detection

A cybersecurity researcher has unveiled a sophisticated new method for extracting Windows credentials and secrets that successfully evades detection by…

PoC Exploit and Technical Analysis Published for Apple 0-Day RCE Vulnerability
25
Aug
2025

PoC Exploit and Technical Analysis Published for Apple 0-Day RCE Vulnerability

A critical zero-click remote code execution vulnerability in Apple’s iOS has been disclosed with a working proof-of-concept exploit, marking another…

Critical Tableau Server Flaws Allows Malicious File Uploads
25
Aug
2025

Critical Tableau Server Flaws Allows Malicious File Uploads

Salesforce has addressed multiple critical security vulnerabilities in Tableau Server and Desktop that could enable attackers to upload malicious files…

Agentic AI vs SOAR: What’s the Real Difference?a
22
Aug
2025

Agentic AI vs SOAR: What’s the Real Difference?a

By now, you’ve heard the hype. Agentic AI; self-directed and goal-oriented. Supposedly, the next big thing in security automation. If…

Rogue Go Module Doubles as Fast SSH Brute-Forcer, Sends Stolen Passwords via Telegram
22
Aug
2025

Rogue Go Module Doubles as Fast SSH Brute-Forcer, Sends Stolen Passwords via Telegram

Socket’s Threat Research Team has uncovered a deceptive Go module named golang-random-ip-ssh-bruteforce, which masquerades as an efficient SSH brute-forcing tool…

Microsoft to Restrict Use of OnMicrosoft Domains for Email Sending
22
Aug
2025

Microsoft to Restrict Use of OnMicrosoft Domains for Email Sending

Microsoft has announced significant restrictions on the use of default onmicrosoft.com domains for email communication, implementing new throttling measures to…

Hackers Hijack VPS Servers to Breach Software-as-a-Service Accounts
22
Aug
2025

Hackers Hijack VPS Servers to Breach Software-as-a-Service Accounts

Virtual Private Servers (VPS) have long served as versatile tools for developers and businesses, offering dedicated resources on shared physical…

Help TDS Hacks Legitimate Websites, Using PHP Templates to Display Fake Microsoft Security Alerts
22
Aug
2025

Help TDS Hacks Legitimate Websites, Using PHP Templates to Display Fake Microsoft Security Alerts

GoDaddy Security researchers have unveiled a detailed analysis of Help TDS, a sophisticated Traffic Direction System operational since at least…

BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics
22
Aug
2025

BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics

Ransomware-as-a-Service (RaaS) models continue to democratize sophisticated attacks in the ever-changing world of cybercrime by allowing affiliates with little technical…

Lumma Operators Deploy Cutting-Edge Evasion Tools to Maintain Stealth and Persistence
22
Aug
2025

Lumma Operators Deploy Cutting-Edge Evasion Tools to Maintain Stealth and Persistence

Lumma infostealer affiliates’ complex operating framework was revealed by Insikt Group in a ground-breaking report published on August 22, 2025,…

Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS
22
Aug
2025

Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS

Microsoft Threat Intelligence has spotlighted the escalating adoption of the ClickFix social engineering technique, a sophisticated method that manipulates users…