Security update KB5058379 for Windows 10, released in May 2025, is causing significant technical issues for numerous systems. Users report their devices are unexpectedly booting into Windows Recovery mode and requiring BitLocker recovery keys following the update installation. Windows 10…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia
Andrei Vladimirovich Tarasov, a 33-year-old Russian cybercrime figure known online as “Aels,” has returned to Russia after evading US extradition. Released from Berlin’s Moabit Prison on January 5, 2024, Tarasov had been held for approximately six months following his July…
APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign
Group123, a North Korean state-sponsored Advanced Persistent Threat (APT) group also known by aliases such as APT37, Reaper, and ScarCruft, continues to target Windows-based systems across multiple regions. Active since at least 2012, the group has historically focused on South…
Frigidstealer Malware Targets macOS Users to Harvest Login Credentials
An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable threat since January 2025. This insidious malware capitalizes on user trust by masquerading as routine browser updates, luring unsuspecting individuals into downloading a malicious disk image…
FBI Alerts Public to Malicious Campaign Impersonating US Government Officials
Federal Bureau of Investigation has issued a warning about an ongoing malicious messaging campaign targeting current and former senior US government officials and their contacts. Since April 2025, threat actors have been impersonating high-ranking US officials through text messages and…
Ivanti Endpoint Manager Vulnerabilities Allow Unauthenticated Remote Code Execution
Critical vulnerability chain in Ivanti Endpoint Manager Mobile (EPMM) has exposed enterprise mobile device management systems to pre-authenticated remote code execution (RCE) attacks. The flaws, tracked as CVE-2025-4427 (authentication bypass) and CVE-2025-4428 (remote code execution), allow attackers to compromise systems…
SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign
A meticulously orchestrated phishing campaign targeting Kuwait’s fisheries, telecommunications, and insurance sectors has been exposed by Hunt.io researchers, revealing a sprawling network of over 230 malicious domains and a tightly knit cluster of servers. First detected in early 2025, this…
Jenkins Released Security Updates – Multiple Vulnerabilities Fixed That Allow Attackers to Exploit CI/CD Pipelines
Jenkins, the widely used automation server for CI/CD pipelines, has released a critical security advisory addressing several vulnerabilities in popular plugins. These flaws-ranging from authentication bypasses to cross-site scripting-could allow attackers to compromise Jenkins environments, bypass authentication, or gain elevated…
Hackers Target Industrial Automation Systems Using Over 11,600 Malware Variants
Hackers are stepping up their attacks on Industrial Control Systems (ICS) in the first quarter of 2025, employing an arsenal of 11,679 different malware families. This is a worrying development for industrial cybersecurity. According to a Kaspersky security solutions Report,…
SonicWall SMA1000 Vulnerability Allow Attackers to Exploit Encoded URLs To Remotely Gain Internal Systems Access
SonicWall has issued a critical security advisory (SNWLID-2025-0010) for its SMA1000 Appliance Work Place interface, revealing a high-severity Server-Side Request Forgery (SSRF) vulnerability. The flaw, identified as CVE-2025-40595 with a CVSS v3 score of 7.2, enables unauthenticated attackers to exploit…
Pwn2Own Day 1 – Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked
Security researchers successfully illustrated significant vulnerabilities across several platforms on the first day of Pwn2Own Berlin 2025, taking home a total of $260,000 in prizes. The competition featured 11 different exploit attempts, including the inaugural AI category entries. STAR Labs…
Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses
Cybersecurity researchers have uncovered a growing trend in which threat actors are exploiting Microsoft PowerShell a legitimate Windows command-line interface to bypass advanced antivirus and Endpoint Detection and Response (EDR) defenses. This technique, often termed as “Living off the Land”…
Researchers Replicate Advanced Tactics and Tools of VanHelsing Ransomware
Cybersecurity researchers at AttackIQ have meticulously emulated the intricate tactics, techniques, and procedures (TTPs) of the VanHelsing ransomware, a potent ransomware-as-a-service (RaaS) operation that surfaced in March 2025. This cyber threat has rapidly gained notoriety within the cybercriminal underworld for…
Tor Oniux Tool Offers Anonymous Linux App Traffic
Tor Project has unveiled oniux, a new command-line utility that provides comprehensive network isolation for Linux applications, ensuring all traffic routes exclusively through the Tor network. This tool aims to eliminate the risk of accidental data leaks that can occur…
Proofpoint Buys Hornetsecurity, A Microsoft 365 Security Specialist For $1 Billion
Cybersecurity giant Proofpoint has announced its agreement to acquire Hornetsecurity Group, a leading European provider of AI-powered Microsoft 365 security solutions. The deal, reportedly valued at $1 billion, is expected to close in the second half of 2025, although exact…
Coinbase Data Breach – Customers Personal Info, Government‑ID & Transaction Data Exposed
Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity incident that could cost the company up to $400 million. The breach, revealed in a regulatory filing and confirmed by company officials, stemmed from a sophisticated…
Coinbase Data Breach – Customers Personal Info, Government‑ID & Account Data Exposed
Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity incident that could cost the company up to $400 million. The breach, revealed in a regulatory filing and confirmed by company officials, stemmed from a sophisticated…
CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited
Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified Windows 0-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities, currently exploited in the wild, present significant risks for organizations…
Inside Turla’s Uroboros Infrastructure and Tactics Revealed
In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed to the infamous APT group Turla, uncovers a chilling display of sophistication and mastery over Windows kernel internals. With the sample identified by the MD5 hash…
CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding five zero-day vulnerabilities affecting multiple Fortinet products, after evidence emerged of active exploitation in the wild. The vulnerabilities, tracked as CVE-2025-32756, impact Fortinet’s FortiVoice, FortiMail, FortiNDR,…