❌

Reading view

There are new articles available, click to refresh the page.

Microsoft December 2025 Patch Tuesday Fixes 56 Vulnerabilities Fixed and 3 Zero-days

By: Divya

Microsoft’s final Patch Tuesday of 2025 has been released, addressing 56 vulnerabilities across its product suite. The December update includes patches for three zero-day vulnerabilities, one of which is confirmed to be actively exploited in the wild. Among the resolved flaws, two are rated as β€œCritical,” while the remaining 54 are classified as β€œImportant” in […]

The post Microsoft December 2025 Patch Tuesday Fixes 56 Vulnerabilities Fixed and 3 Zero-days appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Makop Ransomware Targets RDP Systems Using AV Killer and Additional Exploits

Makop, a ransomware strain derived from Phobos, continues to pose a significant threat by exploiting exposed Remote Desktop Protocol (RDP) systems and integrating new attack components, including antivirus-killer modules and advanced privilege-escalation exploits. Recent investigations by Acronis TRU researchers reveal that Makop operators have evolved their methodology to include multiple evasion techniques and secondary payload […]

The post Makop Ransomware Targets RDP Systems Using AV Killer and Additional Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Zoom Rooms on Windows and macOS Exposed to Privilege Escalation and Data Leakage Flaws

By: Divya

Zoom has released security patches addressing two critical vulnerabilities in Zoom Rooms deployments on both Windows and macOS. The vulnerabilities expose users to privilege escalation attacks and unauthorized software manipulation, prompting immediate update recommendations across enterprise environments. The first vulnerability, tracked as CVE-2025-67460, affects Zoom Rooms for Windows with a High severity rating. This flaw […]

The post Zoom Rooms on Windows and macOS Exposed to Privilege Escalation and Data Leakage Flaws appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Threat Actors Poison SEO to Spread Fake Microsoft Teams Installer

The Chinese advanced persistent threat (APT) group Silver Fox (also known as Void Arachne) has launched a sophisticated search engine optimization (SEO) poisoning campaign targeting Chinese-speaking employees at organizations worldwide. The campaign distributes a counterfeit Microsoft Teams installer laced with ValleyRAT malware, while employing Cyrillic characters and Russian-language elements as deliberate false flags to mislead […]

The post Threat Actors Poison SEO to Spread Fake Microsoft Teams Installer appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

GOLD BLADE: Custom QWCrypt Locker for Data Exfiltration and Ransomware Deployment

Between February 2024 and August 2025, security researchers uncovered a significant campaign orchestrated by the GOLD BLADE threat group, previously known as RedCurl, RedWolf, and Earth Kapre. The investigation of nearly 40 intrusions linked to STAC6565 reveals a sophisticated threat actor that has evolved from traditional cyberespionage into a hybrid operation combining data theft with […]

The post GOLD BLADE: Custom QWCrypt Locker for Data Exfiltration and Ransomware Deployment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Microsoft Copilot Outage Disrupts UK and Europe With Access Failures and Broken Features

By: Divya

Microsoft Copilot, the AI tool many businesses use daily, is facing significant problems today. Users in the United Kingdom and parts of Europe are reporting that they cannot access the service. Others say that even if they can log in, many features are broken or not working correctly. Microsoft has confirmed the problem. On their […]

The post Microsoft Copilot Outage Disrupts UK and Europe With Access Failures and Broken Features appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware

Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical security React2Shell flaw in React Server Components (RSC) to deliver a previously undocumented remote access trojan dubbed EtherRAT. "EtherRAT leverages Ethereum smart contracts for command-and-control (C2) resolution, deploys five independent Linux persistence mechanisms, and

Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure

Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment that the tool is offered to other threat actors under a malware-as-a-service (MaaS) model. The threat actor behind CastleLoader has been assigned the name GrayBravo by Recorded Future's Insikt Group, which was previously tracking it as TAG-150.

Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading

The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced tactics like domain spoofing, DLL side-loading, and fileless PowerShell execution to facilitate ransomware attacks. "These methods allow them to bypass defenses, infiltrate networks, maintain persistence, and operate undetected, raising serious concerns for

Major League Hacking (MLH) to Accelerate Blockchain Education for Student Developers, Focused on Solana

Major League Hacking (MLH) is excited to announce a new initiative to expand access to blockchain education and hands-on learning for next-gen developers worldwide, with a focus on Solana, the fastest-growing blockchain ecosystem.

We’re creating new ways for students and next-gen developers to learn, build, and explore the future of decentralized technology. As of December 2025, Solana will debut at MLH hackathons across the world, offering participants hands-on opportunities to experiment with blockchain development. Through workshops, technical challenges, and mentorship, developers will be able to gain practical experience building on Solana in a supportive environment designed for learning-by-doing.

Learning by Doing, Supported by Solana Technology

At MLH, our mission has always been to help developers learn by doing. This initiative builds directly on that philosophy by giving students access to the tools, resources, and guidance they need to turn ideas into real, deployable projects.

Solana’s debut at MLH hackathons represents more than a new track. It’s an invitation for student developers to join an active, global ecosystem. By bringing Solana technology directly into hackathon environments, we’re helping hackers take their first steps into blockchain development with the tools and mentorship to succeed.

Building Beyond the Hackathon: The Solana Micro-Grant Program

One of the most exciting parts of this initiative is the launch of the Solana Micro-Grant Program, coming later this year.

Through this initiative, MLH and Solana will award up to 75 developer micro-grants through December 2026, helping promising projects continue long after the hackathon weekend ends. These grants will support a wide range of projects, from developer tooling and educational templates to early-stage startups and public-good infrastructure that strengthen the Solana ecosystem.

In addition to funding, grant recipients will receive mentorship and community exposure, helping them grow their projects and connect with other builders in the Solana network. It’s another way MLH helps ensure that great ideas don’t just start at hackathons; they keep growing.

Expanding Hands-On Blockchain Education

The initiative will also extend to our Fellowship Program, where students will have opportunities to contribute directly to Solana-related open-source projects in place of a traditional internship. This means students won’t just learn how blockchain works. They’ll build real-world software that powers it.

Additional educational support, including workshops, developer challenges, and learning content, will help participants understand key concepts in Solana program development, payments, and AI.

A Global Opportunity for Builders

While the initial rollout focuses on North America, the initiative will soon expand globally through initiatives like 100 Days of Solana, an open developer learning challenge that invites hackers from around the world to explore blockchain development together.

This aligns with MLH’s commitment to accessibility and inclusion in tech. Our community already spans over one million student developers across 98 countries, and with Solana’s involvement, even more hackers will have access to cutting-edge tools, mentorship, and funding opportunities.

What This Means for the MLH Community

This initiative represents a natural evolution of MLH’s mission: to bridge the gap between academic learning and real-world experience. By integrating Solana’s technology and developer ecosystem into MLH programs, we’re helping next-gen developers gain future-ready skills and the confidence to apply them in meaningful ways.

Get Involved

Want to start building on Solana at your next hackathon? Check out upcoming MLH events at mlh.io/events, and keep an eye out for the launch of the Solana Micro-Grant Program later this year.

The post Major League Hacking (MLH) to Accelerate Blockchain Education for Student Developers, Focused on Solana appeared first on Major League Hacking News.

Akira Group Targets Hyper-V and VMware ESXi with Ransomware Exploiting Vulnerabilities

Hypervisors the invisible backbone of modern corporate IT have become the new primary battleground for ransomware groups. According to new data from Huntress, attacks targeting hypervisors to deploy ransomware have skyrocketed in late 2025. While hypervisors like VMware ESXi and Microsoft Hyper-V power virtually all enterprise virtual machines (VMs), they often lack the security protections […]

The post Akira Group Targets Hyper-V and VMware ESXi with Ransomware Exploiting Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

❌