❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 13 December 2025Hacking and InfoSec

Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files

By: Divya
13 December 2025 at 01:06

Seqrite Labs has uncovered an active Russian phishing campaign that delivers Phantom information-stealing malware through malicious ISO files embedded in fake payment confirmation emails. The sophisticated attack primarily targets finance and accounting professionals in Russia, using social engineering tactics to deceive victims into executing malicious payloads that steal credentials, cryptocurrency wallets, browser data, and sensitive […]

The post Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security flaws that it said have been exploited in the wild, one of which is the same flaw that was patched by Google in Chrome earlier this week. The vulnerabilities are listed below - CVE-2025-43529 (CVSS score: N/A) - A use-after-free vulnerability in WebKit

Yesterday β€” 12 December 2025Hacking and InfoSec

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. "These repositories, often themed as development utilities or OSINT tools, contain only a few lines of code responsible for silently downloading a remote HTA file and executing

Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide

12 December 2025 at 10:41

Torrance, United States / California, December 12th, 2025, CyberNewsWire In December 2025, CVE-2025-55182 (React2Shell), a vulnerability in React Server Components (RSC) that enables remote code execution (RCE), was publicly disclosed. Shortly after publication, multiple security vendors reported scanning activity and suspected exploitation attempts, and CISA has since added the flaw to its Known Exploited Vulnerabilities […]

The post Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

New JSCEAL Infostealer Malware Targets Windows Systems to Steal Login Credentials

12 December 2025 at 08:10

A sophisticated information-stealing tool known as JSCEAL has evolved significantly in recent months, deploying advanced anti-analysis techniques and hardened command-and-control infrastructure to target users of cryptocurrency applications on Windows systems. Security researchers from Cato CTRL discovered the enhanced malware variant during an active campaign that began in August 2025, marking a substantial shift in the […]

The post New JSCEAL Infostealer Malware Targets Windows Systems to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

MITRE Unveils 2025’s Top 25 Most Dangerous Software Weaknesses

By: Divya
12 December 2025 at 07:56

MITRE has released its annualΒ Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software WeaknessesΒ list for 2025, identifying the most critical vulnerabilities affecting software development worldwide. The comprehensive analysis draws from over 39,080 CVE records, providing security professionals and developers with actionable intelligence to strengthen their defenses. MITRE 2025 list reveals significant shifts in the vulnerability […]

The post MITRE Unveils 2025’s Top 25 Most Dangerous Software Weaknesses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Research Findings on the Fate of Data Stolen in Phishing Attacks

12 December 2025 at 07:28

New research from Kaspersky has mapped the complete lifecycle of data stolen during phishing attacks, revealing a sophisticated β€œshadow market conveyor belt” where victim information is instantly commoditized. The analysis traces the digital trail from the initial click on a fraudulent link to the eventual sale of credentials on dark web markets, highlighting how automated […]

The post Research Findings on the Fate of Data Stolen in Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

CISA Issues New Guidance for Securing UEFI Secure Boot on Enterprise Devices

By: Divya
12 December 2025 at 06:59

The Cybersecurity and Infrastructure Security Agency has released critical guidance on managing UEFI Secure Boot configurations across enterprise systems. The comprehensive advisory addresses growing concerns about boot-level security vulnerabilities that have exposed organizations to firmware-based threats and persistent malware attacks.​ Recent vulnerabilities, including PKFail, BlackLotus, and BootHole, have demonstrated significant gaps in Secure Boot implementations […]

The post CISA Issues New Guidance for Securing UEFI Secure Boot on Enterprise Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Researchers Revive 2000s β€˜Blinkenlights’ to Extract Smartwatch Firmware via Screen Pixels

12 December 2025 at 06:11

Security researchers have successfully extracted firmware from a cheap JieLi-based smartwatch by reviving an obscure 2000s attack technique that transmits sensitive data through display pixels. The novel approach, which builds upon decades-old β€œblinkenlights” methodology, demonstrates a significant vulnerability in how budget smartwatch manufacturers handle memory access and screen rendering without proper validation checks. The research […]

The post Researchers Revive 2000s β€˜Blinkenlights’ to Extract Smartwatch Firmware via Screen Pixels appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

CISA Alerts on Active Exploitation of Windows Cloud Files Mini Filter 0-Day

By: Divya
12 December 2025 at 05:47

A critical privilege escalation vulnerability in Microsoft Windows Cloud Files Mini Filter Driver is now under active exploitation, according to a new Cybersecurity and Infrastructure Security Agency (CISA) advisory. The vulnerability, tracked as CVE-2025-62221, poses a significant risk to Windows systems and has prompted urgent security recommendations. The use-after-free vulnerability allows authorized attackers to escalate […]

The post CISA Alerts on Active Exploitation of Windows Cloud Files Mini Filter 0-Day appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

10,000+ Docker Hub Images Exposed with Live Production Credentials from 100+ Firms

By: Divya
12 December 2025 at 04:29

A comprehensive security analysis has uncovered a critical vulnerability in container image distribution: more than 10,000 Docker Hub images containing leaked production credentials from over 100 organizations, including a Fortune 500 company and a central national bank. The research, conducted in November 2025, reveals an alarming trend in which developers unknowingly embed sensitive credentials directly […]

The post 10,000+ Docker Hub Images Exposed with Live Production Credentials from 100+ Firms appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users

12 December 2025 at 04:05

Cybersecurity researchers at Datadog have uncovered a sophisticated adversary-in-the-middle phishing campaign targeting organizations that use Microsoft 365 and Okta for single sign-on authentication. The campaign leverages advanced techniques to hijack legitimate SSO authentication flows and bypass multi-factor authentication methods that lack phishing-resistant capabilities, posing a significant threat to enterprise security infrastructures. The attack addressed phishing […]

The post New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

ConsentFix Attack Lets Hackers Hijack Microsoft Accounts via Azure CLI Abuse

By: Divya
12 December 2025 at 03:48

Security researchers at Push have identified a sophisticated new phishing attack termed β€œConsentFix,” which combines OAuth consent manipulation with ClickFix-style social engineering to compromise Microsoft accounts without requiring passwords or bypassing multi-factor authentication. The campaign targets users explicitly by abusing the Azure CLI OAuth application. This first-party Microsoft tool enjoys implicit trust within enterprise environments. […]

The post ConsentFix Attack Lets Hackers Hijack Microsoft Accounts via Azure CLI Abuse appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Fresh Content Updates from November 2025

12 December 2025 at 09:00

"Good information. Everyone who owns a computer should do this training across the country. It should be mandatory!”

"Wow, I had no idea of the detail and advanced interrogation these criminals use! This was the most eye-opening session I've seen in a long time and VERY timely”

"This was a valuable video. I love the practical tips for how to spot the fake video images - especially the shadows and the lack of glare on the glasses. Thank you!”

KnowBe4 is here to help you prepare for the evolving AI security landscape. As AI becomes more prevalent in the workplace, new threats and vulnerabilities are emerging. Now is the time to train your users on AI-related security risks!

We have 80+ pieces of content in our library specifically addressing AI threats. Here are a few of our most used and highest-rated security awareness modules:

  • AI Chatbots: Understanding Their Use, Risks and Limitations in the Workplace
  • New Tools: Artificial Intelligence Scams
  • Generative AI: Seeing through the Deception

We have even more AI security content on the roadmap, so stay subscribed to this newsletter for new releases to help you protect your organization against emerging AI-driven threats.

❌
❌