Category: GBHackers

Win-DoS’ Zero-Click Exploit Could Weaponize Windows Infrastructure for DDoS Attacks
11
Aug
2025

Win-DoS’ Zero-Click Exploit Could Weaponize Windows Infrastructure for DDoS Attacks

Security researchers have uncovered a “zero-click” denial-of-service chain that can silently turn thousands of Microsoft Windows Domain Controllers (DCs) into…

Hackers Extradited to US Over $100 Million Romance Scams and Other Frauds
11
Aug
2025

Hackers Extradited to US Over $100 Million Romance Scams and Other Frauds

United States Attorney for the Southern District of New York, Jay Clayton, alongside FBI Assistant Director in Charge Christopher G….

Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs
11
Aug
2025

Report Reveals Tool Overload Driving Fatigue and Missed Threats in MSPs

New Heimdal study reveals how tool sprawl creates blind spots, with over half of providers experiencing daily or weekly burnout….

Erlang/OTP SSH RCE Vulnerability Actively Exploited to Target OT Networks
11
Aug
2025

Erlang/OTP SSH RCE Vulnerability Actively Exploited to Target OT Networks

A severe vulnerability, designated CVE-2025-32433 with a CVSS score of 10.0, has been identified in the Secure Shell (SSH) daemon…

UAC-0099 Tactics, Techniques, Procedures and Attack Methods Revealed
11
Aug
2025

UAC-0099 Tactics, Techniques, Procedures and Attack Methods Revealed

UAC-0099, a persistent threat actor active since at least 2022, has conducted sophisticated cyber-espionage operations against Ukrainian government, military, and…

Meta’s New Feature Turns Instagram into a Real-Time Location Broadcaster
11
Aug
2025

Meta’s New Feature Turns Instagram into a Real-Time Location Broadcaster

Meta has introduced a transformative update to Instagram, evolving the platform from a simple photo-sharing service into an always-on real-time…

Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks
11
Aug
2025

Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks

Security researchers have uncovered a concerning vulnerability that transforms everyday USB webcams into covert attack tools capable of injecting malicious…

Silent Watcher Targets Windows Systems, Steals Data via Discord Webhooks
11
Aug
2025

Silent Watcher Targets Windows Systems, Steals Data via Discord Webhooks

K7 Labs investigated the Cmimai Stealer, a Visual Basic Script (VBS)-based infostealer that surfaced in June 2025 and uses PowerShell…

Smart Bus System Flaw Allows Hackers to Remotely Track and Control Vehicles
11
Aug
2025

Smart Bus System Flaw Allows Hackers to Remotely Track and Control Vehicles

A critical security vulnerability in smart bus systems has been discovered that enables hackers to remotely track vehicle locations and…

CastleLoader Malware Hits 400+ Devices via Cloudflare-Themed ClickFix Phishing Attack
11
Aug
2025

CastleLoader Malware Hits 400+ Devices via Cloudflare-Themed ClickFix Phishing Attack

CastleLoader, a sophisticated malware loader, has compromised over 400 devices since its debut in early 2025, with cybersecurity firm PRODAFT…

Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups
11
Aug
2025

Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups

Security researcher Ionuț Cernica revealed how commonplace Linux utilities can be weaponized to siphon sensitive data in multi-tenant environments. His…

Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope
11
Aug
2025

Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope

Security researchers at AmberWolf have uncovered critical vulnerabilities in leading Zero Trust Network Access (ZTNA) solutions from major cybersecurity vendors,…