Category: GBHackers

New EDR-Redir Tool Bypasses EDRs by Exploiting Bind Filter and Cloud Filter Driver
27
Oct
2025

New EDR-Redir Tool Bypasses EDRs by Exploiting Bind Filter and Cloud Filter Driver

Cybersecurity researchers have developed a sophisticated new tool called EDR-Redir that can bypass Endpoint Detection and Response (EDR) systems by…

Hackers Target 81% of Routers with Default Admin Passwords
27
Oct
2025

Hackers Target 81% of Routers with Default Admin Passwords

The latest 2025 Broadband Genie router security survey reveals alarming trends in network security awareness among internet users. This year’s…

Mem3nt0 Mori Hackers Actively Exploiting Vulnerability
27
Oct
2025

Mem3nt0 Mori Hackers Actively Exploiting Vulnerability

In March 2025, security researchers at Kaspersky detected a sophisticated campaign exploiting a previously unknown Chrome vulnerability to deliver advanced…

iOS 26 Overwrites ‘shutdown.log’ on Reboot, Erasing Forensic Evidence of Pegasus and Predator Spyware
27
Oct
2025

iOS 26 Overwrites ‘shutdown.log’ on Reboot, Erasing Forensic Evidence of Pegasus and Predator Spyware

As iOS 26 is being rolled out, a critical forensic challenge has emerged: the operating system now automatically overwrites the…

Dell Storage Manager Vulnerabilities Allow Full System Compromise
27
Oct
2025

Dell Storage Manager Vulnerabilities Allow Full System Compromise

Dell Technologies has disclosed three critical vulnerabilities affecting Dell Storage Manager that could allow unauthenticated remote attackers to completely compromise…

Critical HashiCorp Vault Vulnerabilities Allow Authentication Bypass and DoS Attacks
27
Oct
2025

Critical HashiCorp Vault Vulnerabilities Allow Authentication Bypass and DoS Attacks

HashiCorp has disclosed two critical vulnerabilities in Vault and Vault Enterprise that could enable attackers to bypass authentication mechanisms and…

Coordinated Cyberattacks Seek to Cripple Critical Infrastructure
27
Oct
2025

Coordinated Cyberattacks Seek to Cripple Critical Infrastructure

A sophisticated cyber-sabotage group known as Predatory Sparrow has emerged as one of the most destructive threat actors targeting Iranian…

North Korean Chollima Actors Added BeaverTail and OtterCookie to its Arsenal
27
Oct
2025

North Korean Chollima Actors Added BeaverTail and OtterCookie to its Arsenal

Famous Chollima, a DPRK-aligned threat group, has evolved its arsenal, with BeaverTail and OtterCookie increasingly merging functionalities to steal credentials…

Qilin Ransomware Exploits MSPaint and Notepad to Locate Sensitive Files
27
Oct
2025

Qilin Ransomware Exploits MSPaint and Notepad to Locate Sensitive Files

In the latter half of 2025, the Qilin ransomware group has solidified its standing as a formidable threat, continuing to…

Critical CoPhish Exploit Uses Copilot Studio to Hijack OAuth Tokens
27
Oct
2025

Critical CoPhish Exploit Uses Copilot Studio to Hijack OAuth Tokens

Security researchers at Datadog have uncovered a sophisticated phishing technique that weaponizes Microsoft Copilot Studio to conduct OAuth token theft…

Microsoft Adds Wi-Fi-Based Work Location Auto-Detection to Teams
27
Oct
2025

Microsoft Adds Wi-Fi-Based Work Location Auto-Detection to Teams

Microsoft is preparing to introduce a groundbreaking feature in Teams that will revolutionise how hybrid workers manage their presence information….

WhatsApp 0-Click Exploit Disclosed to Meta at Pwn2Own Security Event
27
Oct
2025

WhatsApp 0-Click Exploit Disclosed to Meta at Pwn2Own Security Event

Cybersecurity researchers from Team Z3 have withdrawn their planned demonstration of a zero-click remote code execution vulnerability in WhatsApp at…