SecureVibes, an innovative AI-native security system designed for modern applications, has unveiled a comprehensive vulnerability scanner that leverages Anthropic’s Claude AI to deliver intelligent security analysis across eleven programming languages. The tool represents a significant advancement in automated vulnerability detection…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
AppleScript Used to Deliver macOS Malware Disguised as Zoom & Teams Updates
Since Apple removed the popular “right-click and open” Gatekeeper override in August 2024, threat actors have shifted their tactics to deliver malware on macOS. Among emerging techniques, attackers are increasingly leveraging AppleScript (.scpt) files to bypass security controls and distribute…
MastaStealer Exploits Windows LNK to Launch PowerShell and Bypass Defender
Windows LNK files remain a preferred vector for attackers seeking to establish initial access on target systems. Recently, security researchers identified a sophisticated MastaStealer campaign that exploits these shortcut files to deliver a full-featured C2 beacon while simultaneously turning off…
Hackers Exploit SSRF Flaw in Custom GPTs to Steal ChatGPT Secrets
A cybersecurity researcher has uncovered a server-side request forgery (SSRF) vulnerability in OpenAI’s ChatGPT. The flaw, hidden in the Custom GPTs feature, allowed attackers to potentially access sensitive cloud infrastructure secrets, including Azure management API tokens. Disclosed through OpenAI’s bug…
Rhadamanthys Stealer Servers Reportedly Seized; Admin Urges Immediate Reinstallation
Widespread reports suggest major law enforcement operation targeting notorious malware infrastructure has disrupted the Rhadamanthys stealer control panel, prompting urgent security alerts. In a significant development within the cybersecurity community, reports indicate that German law enforcement authorities may have seized…
Authentication Coercion: How Windows Machines Are Tricked into Leaking Credentials
Cybersecurity researchers have identified a growing trend in Windows-targeted attacks that exploit fundamental operating system features to force machines into surrendering valuable credentials without requiring user interaction or system vulnerabilities. Known as authentication coercion, this attack method manipulates legitimate Remote…
English-Speaking Cybercriminal Network ‘The COM’ Drives Global Cyberattacks
The English-speaking cybercriminal ecosystem known as “The COM” has evolved from a niche underground culture into a sophisticated, professional service-oriented economy that orchestrates some of the world’s most disruptive cyberattacks. Over the past decade, this decentralized network has transformed from…
Microsoft SQL Server Vulnerability Allows Privilege Escalation
Microsoft has disclosed a critical SQL injection vulnerability in SQL Server that could allow authenticated attackers to escalate their privileges over a network. Tracked as CVE-2025-59499 and assigned an Important severity rating, the vulnerability stems from improper neutralization of special…
Chrome Security Update Fixes Improper Implementation in V8 JavaScript Engine
Google has released a new stable Chrome update that addresses a serious flaw in its V8 JavaScript engine. The update, now available as version 142.0.7444.162/.163 for Windows, 142.0.7444.162 for Mac, and 142.0.7444.162 for Linux, will roll out to users over…
GitHub Copilot and Visual Studio Flaws Let Attackers Bypass Security Protections
Microsoft has disclosed two critical security vulnerabilities affecting GitHub Copilot and Visual Studio Code that could allow attackers to bypass important security protections. Both flaws were reported on November 11, 2025, and carry “Important” severity ratings, posing immediate risks to…
Tor Browser 15.0.1 Update Patches Several High-Risk Security Flaws
The Tor Project has released a fresh update for its privacy-focused web browser. Tor Browser 15.0.1 is now available and addresses several high-risk security issues that could have compromised users’ privacy. This update is recommended for all users who want…
New Phishing Scam Targets iPhone Owners After Device Loss
Losing an iPhone is stressful enough without becoming the target of sophisticated scammers. A new phishing campaign is exploiting device owners’ distress by impersonating Apple and claiming that their lost iPhones have been recovered. These attacks combine social engineering with…
Lite XL Vulnerability Allows Attackers to Execute Arbitrary Code
Lite XL, a lightweight text editor written in Lua and C that runs on Windows, Linux, and macOS, has been found to contain a high vulnerability that could enable arbitrary code execution. Security researchers have identified flaws in how the…
Phishing Attack Impersonates Travel Brands Using 4,300 Malicious Domains
A Russian-speaking threat actor has orchestrated an extensive phishing campaign that has registered over 4,300 malicious domains targeting travelers since the beginning of 2025. The sophisticated operation customizes phishing pages to impersonate legitimate travel industry giants including Airbnb, Booking.com, Expedia,…
Windows Kernel 0-Day Under Active Exploitation for Privilege Escalation
Microsoft has disclosed a critical Windows Kernel vulnerability that is currently under active exploitation in the wild. Tracked as CVE-2025-62215, the flaw enables attackers to escalate privileges and gain elevated access on vulnerable Windows systems. Attribute Details CVE ID CVE-2025-62215…
Chinese National Sentenced for Laundering Over £5 Billion from 128,000 Victims
A landmark Metropolitan Police investigation has concluded with the sentencing of two individuals involved in one of the world’s largest cryptocurrency seizures, which recovered over 61,000 Bitcoin, worth approximately £5 billion, from a sophisticated international fraud operation. A seven-year investigation…
Mozilla Issues Urgent Firefox Update to Patch Critical Code Execution Flaws
The Mozilla Foundation released three critical security advisories on November 11, 2025, addressing 16 unique vulnerabilities across multiple Firefox versions and platforms. The updates target Firefox 145, Firefox ESR 115.30, and Firefox ESR 140.5, with 12 vulnerabilities rated High impact and an…
Microsoft Patch Tuesday for November 2025 – Fix for 0-day and Other 62 Vulnerabilities
Microsoft has released its November 2025 Patch Tuesday update, addressing 63 security vulnerabilities across its software lineup. The update includes a critical fix for a zero-day vulnerability in the Windows Kernel that is confirmed to be actively exploited in the…
Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Files Anywhere on Target Systems
Ivanti has released critical security updates for Ivanti Endpoint Manager to address three high-severity vulnerabilities that could allow authenticated attackers to write arbitrary files to any location on affected systems. The company disclosed the security advisory on November 10, 2025,…
Zoom Workplace for Windows Flaw Allows Local Privilege Escalation
A security vulnerability has been discovered in Zoom Workplace’s VDI Client for Windows that could allow attackers to escalate their privileges on affected systems. The flaw, tracked as CVE-2025-64740 and assigned bulletin ZSB-25042, has been rated as High severity with a CVSS…