Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

New BruteForceAI Tool Automates Login Page Detection and Attacks

A cutting-edge penetration testing tool called BruteForceAI has arrived, bringing automation and artificial intelligence to the art of login page detection and brute-force attacks. Designed for security professionals and researchers, BruteForceAI streamlines two critical stages of a login attack: finding login forms…

Android Issues Security Update to Patch Actively Exploited 0-Day Flaws

Google has released a critical Android Security Bulletin for September 2025, addressing multiple high-severity vulnerabilities that are currently being actively exploited in the wild. The security patch level 2025-09-05 or later is required to protect Android devices from these serious threats. The security bulletin…

IIS WebDeploy RCE Vulnerability Gets Public PoC

A newly disclosed remote code execution (RCE) vulnerability in Microsoft’s IIS Web Deploy toolchain has captured industry attention after the release of a public proof-of-concept. Tracked as CVE-2025-53772, this flaw resides in the unsafe deserialization logic of the msdeployagentservice and…

Hijacked by RapperBot: Devices Exploited for Instant DDoS Attacks

A newly uncovered variant of the notorious RapperBot malware is covertly commandeering internet-connected devices—particularly outdated network video recorders (NVRs)—and transforming them into a powerful distributed denial-of-service (DDoS) army in mere moments. Security researchers have detailed a sophisticated exploit chain that…

Top 10 Best API Penetration Companies In 2025

Securing APIs is a critical cybersecurity challenge in 2025 as they are the backbone of modern applications and a prime target for attackers. API penetration testing is no longer an optional check; it’s a necessity for finding business logic flaws,…

ESPHome Vulnerability Allows Unauthorized Access to Smart Devices

A critical authentication bypass flaw in ESPHome’s ESP-IDF web server component allows unauthorized users on the same local network to access and control smart devices without any valid credentials. Discovered and reported by security researcher jesserockz, the vulnerability (CVE-2025-57808) undermines…

OneDrive Phishing Attack Targets Corporate Executives for Credential Theft

A newly discovered spearphishing campaign is targeting executives and senior leadership across multiple industries by exploiting trusted OneDrive document‐sharing notifications. The Stripe OLT SOC has identified this sophisticated attack, which leverages highly tailored emails to impersonate internal HR communications and…

Google Dismiss Reports of Major Gmail Security Alert

Google has firmly rejected widespread reports suggesting it issued a global security alert to its 2.5 billion Gmail users, calling such claims “entirely false”. The tech giant moved swiftly to clarify the situation after viral headlines sparked unnecessary panic among…

Iran-Nexus Hackers Exploit Omani Mailbox to Target Governments

A sophisticated spear-phishing campaign that exploited a compromised mailbox belonging to the Ministry of Foreign Affairs of Oman. The operation, attributed to an Iranian-aligned group known as Homeland Justice and linked to Iran’s Ministry of Intelligence and Security (MOIS), masqueraded…

Threat Hunting Guide Designed for SOC Analysts and MSSPs

Proactive threat hunting has become an essential discipline for Security Operations Center (SOC) analysts and Managed Security Service Providers (MSSPs).  Traditional detection methods often miss novel or sophisticated adversarial techniques, making it critical for security teams to leverage advanced tools…