Reading view
Warning: Phishing Campaign Leveraging Evilginx Targets U.S. Universities
Threat actors are using the open-source phishing framework Evilginx to target universities across the United States, according to researchers at Infoblox. The attackers have targeted at least 18 universities and educational entities since April 2025, using phishing pages that spoofed student single sign-on (SSO) portals.
North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware

Police Dismantle EUR 700 Million Crypto Scam That Used Deepfakes
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

New GeminiJack 0-Click Flaw in Gemini AI Exposed Users to Data Leaks
Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading

Major League Hacking (MLH) to Accelerate Blockchain Education for Student Developers, Focused on Solana
Major League Hacking (MLH) is excited to announce a new initiative to expand access to blockchain education and hands-on learning for next-gen developers worldwide, with a focus on Solana, the fastest-growing blockchain ecosystem.
Weβre creating new ways for students and next-gen developers to learn, build, and explore the future of decentralized technology. As of December 2025, Solana will debut at MLH hackathons across the world, offering participants hands-on opportunities to experiment with blockchain development. Through workshops, technical challenges, and mentorship, developers will be able to gain practical experience building on Solana in a supportive environment designed for learning-by-doing.
Learning by Doing, Supported by Solana Technology
At MLH, our mission has always been to help developers learn by doing. This initiative builds directly on that philosophy by giving students access to the tools, resources, and guidance they need to turn ideas into real, deployable projects.
Solanaβs debut at MLH hackathons represents more than a new track. Itβs an invitation for student developers to join an active, global ecosystem. By bringing Solana technology directly into hackathon environments, weβre helping hackers take their first steps into blockchain development with the tools and mentorship to succeed.
Building Beyond the Hackathon: The Solana Micro-Grant Program
One of the most exciting parts of this initiative is the launch of the Solana Micro-Grant Program, coming later this year.
Through this initiative, MLH and Solana will award up to 75 developer micro-grants through December 2026, helping promising projects continue long after the hackathon weekend ends. These grants will support a wide range of projects, from developer tooling and educational templates to early-stage startups and public-good infrastructure that strengthen the Solana ecosystem.
In addition to funding, grant recipients will receive mentorship and community exposure, helping them grow their projects and connect with other builders in the Solana network. Itβs another way MLH helps ensure that great ideas donβt just start at hackathons; they keep growing.
Expanding Hands-On Blockchain Education
The initiative will also extend to our Fellowship Program, where students will have opportunities to contribute directly to Solana-related open-source projects in place of a traditional internship. This means students wonβt just learn how blockchain works. Theyβll build real-world software that powers it.
Additional educational support, including workshops, developer challenges, and learning content, will help participants understand key concepts in Solana program development, payments, and AI.
A Global Opportunity for Builders
While the initial rollout focuses on North America, the initiative will soon expand globally through initiatives like 100 Days of Solana, an open developer learning challenge that invites hackers from around the world to explore blockchain development together.
This aligns with MLHβs commitment to accessibility and inclusion in tech. Our community already spans over one million student developers across 98 countries, and with Solanaβs involvement, even more hackers will have access to cutting-edge tools, mentorship, and funding opportunities.
What This Means for the MLH Community
This initiative represents a natural evolution of MLHβs mission: to bridge the gap between academic learning and real-world experience. By integrating Solanaβs technology and developer ecosystem into MLH programs, weβre helping next-gen developers gain future-ready skills and the confidence to apply them in meaningful ways.
Get Involved
Want to start building on Solana at your next hackathon? Check out upcoming MLH events at mlh.io/events, and keep an eye out for the launch of the Solana Micro-Grant Program later this year.
The post Major League Hacking (MLH) to Accelerate Blockchain Education for Student Developers, Focused on Solana appeared first on Major League Hacking News.
SimpleX Chat X Account Hacked, Fake Site Promotes Crypto Wallet Scam
Akira Group Targets Hyper-V and VMware ESXi with Ransomware Exploiting Vulnerabilities
Hypervisors the invisible backbone of modern corporate IT have become the new primary battleground for ransomware groups. According to new data from Huntress, attacks targeting hypervisors to deploy ransomware have skyrocketed in late 2025. While hypervisors like VMware ESXi and Microsoft Hyper-V power virtually all enterprise virtual machines (VMs), they often lack the security protections [β¦]
The post Akira Group Targets Hyper-V and VMware ESXi with Ransomware Exploiting Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

New Vishing Attack Exploits Microsoft Teams and QuickAssist to Deploy .NET Malware
A sophisticated vishing campaign has emerged that combines social engineering with legitimate Microsoft tools to establish command execution chains leading to multi-stage .NET malware deployment. Security researchers have identified an attack flow that begins with impersonated IT personnel contacting victims via Microsoft Teams and culminates in fileless malware execution through memory-based reflection techniques. The infection [β¦]
The post New Vishing Attack Exploits Microsoft Teams and QuickAssist to Deploy .NET Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Malicious VS Code on Microsoft Registry Steals WiFi Passwords and Captures Screens
Security researchers at Koi Security have uncovered a sophisticated malware campaign targeting developers through the Visual Studio Code Marketplace. The attack uses two seemingly innocent extensions a dark theme and an AI assistant to unleash a potent infostealer capable of capturing screenshots, hijacking browser sessions, and stealing Wi-Fi passwords. The malicious extensions, identified asΒ βBitcoin BlackβΒ andΒ βCodo [β¦]
The post Malicious VS Code on Microsoft Registry Steals WiFi Passwords and Captures Screens appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

SAP Security Patch Day Fixes Critical Flaws in Solution Manager, NetWeaver & More
SAP has released its December 2025 Security Patch Day updates, addressing 14 new security notes that fix multiple critical and highβseverity vulnerabilities across key enterprise products. Administrators are strongly advised to review the latest security notes in the SAP Support Portal and apply the patches without delay to protect their SAP environments. The most serious [β¦]
The post SAP Security Patch Day Fixes Critical Flaws in Solution Manager, NetWeaver & More appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

AI-Driven Tools Uncover GhostPenguin Backdoor Attacking Linux Servers
A sophisticated Linux backdoor named GhostPenguin has been discovered by Trend Micro Research, evading detection for over four months after its initial submission to VirusTotal in July 2025. The threat represents a new breed of stealthy malware designed to maintain a low profile while delivering comprehensive remote access and file system manipulation capabilities to threat [β¦]
The post AI-Driven Tools Uncover GhostPenguin Backdoor Attacking Linux Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Burp Suite Upgrades Scanner With Detection for Critical React2Shell Flaws
ActiveScan++, a widely used extension for the popular penetration testing tool Burp Suite, has released a significant upgrade. The scanner now includes specific detection capabilities for the critical βReact2Shellβ vulnerabilities. This update addresses two high-severity security flaws, CVE-2025-55182 and CVE-2025-66478. Why This Update Matters React2Shell vulnerabilities are critical because they allow attackers to execute remote [β¦]
The post Burp Suite Upgrades Scanner With Detection for Critical React2Shell Flaws appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Malicious MCP Servers Enable Stealthy Prompt Injection to Drain System Resources
Security researchers have uncovered critical vulnerabilities in the Model Context Protocol (MCP) sampling feature that enable malicious servers to execute stealthy prompt injection attacks, drain computational resources, and compromise large language model applications without user detection. The findings reveal three primary attack vectors that exploit the protocolβs inherent trust model and lack of robust security [β¦]
The post Malicious MCP Servers Enable Stealthy Prompt Injection to Drain System Resources appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Exploit Ivanti Connect Secure Vulnerabilities to Spread MetaRAT Malware
LACβs Cyber Emergency Center has identified a sophisticated cyberespionage campaign targeting Japanese shipping and transportation companies. The operation, orchestrated by a China-based threat actor in April 2025, leveraged critical vulnerabilities in Ivanti Connect Secure (ICS) to deploy βMetaRAT,β a newly identified variant of the notorious PlugX malware family. This campaign highlights the persistent evolution of [β¦]
The post Hackers Exploit Ivanti Connect Secure Vulnerabilities to Spread MetaRAT Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
