A threat actor has reportedly put up for sale a previously unknown, or “zero-day,” exploit targeting Intelbras routers on dark web forums, raising significant concerns among cybersecurity professionals and end users. The alleged exploit leverages an undisclosed vulnerability, potentially enabling…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Microsoft Family Safety Now Blocking All Versions of Google Chrome
In a development that has left students, parents, and educators frustrated, Microsoft’s Family Safety feature is now blocking all versions of Google Chrome from launching on Windows devices. The issue, which first surfaced in early June, has persisted for over…
Former JBLM Soldier Admits Attempting to Leak U.S. Military Network Details to China
A former U.S. Army sergeant who served at Joint Base Lewis-McChord (JBLM) in Washington has pleaded guilty to federal charges after admitting he tried to deliver sensitive military secrets to Chinese authorities. Joseph Daniel Schmidt, 31, entered his plea in…
Windows Snipping Tool Now Lets Users Export Captures as GIFs
Microsoft has rolled out a significant update to its popular Snipping Tool, introducing the ability to export screen recordings as animated GIFs—a feature long requested by users and now available to Windows 11 Insiders in the Canary and Dev Channels.…
Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages
A severe cryptographic vulnerability in the popular open-source Meshtastic project allows attackers to decrypt private messages and hijack nodes across LoRa mesh networks. This flaw stems from duplicated encryption keys and insufficient randomness during key generation. The issue affects multiple…
Amazon EKS Flaws Expose AWS Credentials and Enable Privilege Escalation
Recent research has uncovered critical security flaws in Amazon Elastic Kubernetes Service (EKS) that could expose sensitive AWS credentials and enable privilege escalation within cloud environments. The vulnerabilities, rooted in misconfigurations and excessive container privileges, highlight the ongoing challenges of…
CoinMarketCap Doodle Image Vulnerability Lets Attackers Run Malicious Code via API Call
CoinMarketCap, the globally recognized cryptocurrency data aggregator, experienced a significant security incident when a vulnerability in its homepage doodle image was exploited to inject malicious code, leading to a phishing campaign targeting user wallets. Incident Overview The breach originated from…
OpenVPN Driver Vulnerability Let Attackers Crash Windows Systems
Network administrators and cybersecurity experts will be pleased to learn that OpenVPN 2.7_alpha2 will be released on June 19, 2025, according to the OpenVPN community project team. While this early alpha build for the upcoming 2.7.0 feature release introduces several…
Israeli Social Media Users Targeted in Covert Iranian Influence Campaign
A covert Iranian social media operation has been uncovered, targeting Israeli users on platform X with a psychological campaign designed to sow discord and despair. Researchers at the Foundation for Defense of Democracies (FDD) have exposed a Persian-language Telegram channel,…
Mattermost Vulnerabilities Let Attackers Execute Remote Code Via Path Traversal
Mattermost, a widely-used open-source collaboration platform, has recently disclosed critical vulnerabilities in its software that could allow attackers to execute remote code through path traversal exploits. As detailed on the official Mattermost Security Updates page, these flaws have been identified…
Aflac Cyber Attack – Hackers May Have Stolen Personal And Health Information
Aflac Incorporated, a Georgia-based insurance giant, identified unauthorized access to its network infrastructure, raising alarms over a potential data breach. The company swiftly activated its cybersecurity incident response protocols and claims to have contained the intrusion within hours of detection.…
CyberWarfare on the Rise With Surge in Hacktivist Activity Following Israel-Iran
Cyberspace has become a crucial battlefield in addition to conventional combat since the open conflict between Israel and Iran broke out. Following Israeli airstrikes on Iranian nuclear and military sites and Iran’s retaliatory missile salvos, both nations recognized as formidable…
DuckDuckGo Browser’s Scam Blocker to Guard Against Phishing and Malware Sites
DuckDuckGo has rolled out an advanced update to its browser’s built-in Scam Blocker, a robust security feature designed to shield users from a wide array of online threats, including phishing sites, malware, and sophisticated scams. Now integrated into the DuckDuckGo…
Open Directories Exposes Publically Available tools Used by Hackers
A series of misconfigured web servers have been uncovered, revealing a treasure trove of publicly accessible tools and tactics employed by malicious actors targeting critical infrastructure. These exposed open directories, discovered through Hunt’s advanced scanning capabilities, highlight a significant security…
Surge in XSS Cyberattacks Targets Popular Webmail Platforms, ESET Reports
A recent report from ESET has uncovered a sophisticated cyber espionage campaign by the Russia-aligned Sednit group, targeting high-value webmail platforms through cross-site scripting (XSS) attacks. Dubbed Operation RoundPress, this operation has compromised popular webmail services such as Roundcube, Horde,…
Microsoft Announces New Graph Powered Detection of Hybrid Attack Targeting Organizations
Microsoft has unveiled a groundbreaking advancement in cybersecurity with the integration of the Enterprise Exposure Graph into its threat detection and response capabilities. This cutting-edge solution, part of Microsoft Defender XDR and Microsoft Security Exposure Management (MSEM), is designed to…
Iranian Hacktivist Attacking Israeli Military, Government, and Infrastructure Targets
Over 35 different pro-Iranian hacktivist organizations launched a coordinated attack on Israeli military, government, and key infrastructure targets in a dramatic escalation of cyberwarfare. This surge in activity starkly contrasts with the limited response from just 4-5 identified pro-Israeli groups,…
Hackers Target 700+ ComfyUI AI Image Generation Servers to Spread Malware
China’s National Cybersecurity Notification Center has issued an urgent warning about critical vulnerabilities in ComfyUI, a widely used image-generation framework for large AI models. These flaws, already under active exploitation by hacker groups, have compromised at least 695 servers worldwide,…
Cyberattack Disrupts Russian Dairy Supply Chain by Targeting Animal Certification System
In a Russia’s dairy supply chain, a suspected cyberattack has targeted the Mercury component of the national veterinary certification system, forcing it into emergency operation mode. This critical system, integral to the processing of veterinary accompanying documents, ensures the traceability…
Prometei Botnet Targets Linux Servers for Cryptocurrency Mining Operations
Unit 42 researchers from Palo Alto Networks have identified a renewed wave of attacks by the Prometei botnet, specifically targeting Linux servers, as of March 2025. Initially discovered in July 2020 with a focus on Windows systems, Prometei has since…