Category: GBHackers

North Korea Hiding Malware Within JPEG Files to Attack Windows Systems Bypassing Detections
04
Aug
2025

North Korea Hiding Malware Within JPEG Files to Attack Windows Systems Bypassing Detections

Security researchers at Genians Security Center have uncovered a sophisticated new variant of the RoKRAT malware, attributed to the North…

Vulnerabilities in Government-Linked Partner Software Allow Remote Code Attacks
04
Aug
2025

Vulnerabilities in Government-Linked Partner Software Allow Remote Code Attacks

Multiple serious security vulnerabilities have been discovered in Partner Software and Partner Web applications widely used by government agencies and…

NestJS Vulnerability Allows Code Execution on Developer Machines
04
Aug
2025

NestJS Vulnerability Allows Code Execution on Developer Machines

A critical remote code execution vulnerability has been discovered in the popular NestJS framework that could allow attackers to execute…

Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine
04
Aug
2025

Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine

HashiCorp has disclosed a critical security vulnerability affecting its Vault products that could allow privileged operators to execute arbitrary code…

Critical Squid Flaw Allows Remote Code Execution by Attackers
04
Aug
2025

Critical Squid Flaw Allows Remote Code Execution by Attackers

A severe security vulnerability in the widely-used Squid HTTP proxy has been disclosed, potentially exposing millions of systems to remote…

AI-Powered Cursor IDE Exposes Users to Silent Remote Code Execution
04
Aug
2025

AI-Powered Cursor IDE Exposes Users to Silent Remote Code Execution

Cybersecurity researchers at Aim Labs have discovered a critical vulnerability in the popular AI-powered Cursor IDE that enables attackers to…

Pi-hole Plugin Flaw Exposes Donor Names and Email Addresses in Data Breach
03
Aug
2025

Pi-hole Plugin Flaw Exposes Donor Names and Email Addresses in Data Breach

A Pi-hole donor has reported receiving spam email to an address created exclusively for their donation to the popular network-level…

Qilin Ransomware Affiliate Panel Login Credentials Exposed Online
02
Aug
2025

Qilin Ransomware Affiliate Panel Login Credentials Exposed Online

A significant security breach within the Qilin ransomware operation has provided unprecedented insight into the group’s affiliate network structure and…

New Undetectable Plague Malware Targeting Linux Servers for Persistent SSH Access
02
Aug
2025

New Undetectable Plague Malware Targeting Linux Servers for Persistent SSH Access

Security researchers have discovered a sophisticated Linux backdoor dubbed “Plague” that has remained undetected by all major antivirus engines despite…

Akira Ransomware Exploits 0-Day Vulnerability in SonicWall Firewall Devices
02
Aug
2025

Akira Ransomware Exploits 0-Day Vulnerability in SonicWall Firewall Devices

Cybersecurity firm Arctic Wolf has identified a significant increase in ransomware attacks targeting SonicWall firewall devices in late July 2025,…

Blizzard Group's ApolloShadow Malware Installs Root Certificates to Trust Malicious Sites
01
Aug
2025

Blizzard Group’s ApolloShadow Malware Installs Root Certificates to Trust Malicious Sites

Microsoft Threat Intelligence has exposed a sophisticated cyberespionage operation orchestrated by the Russian state-sponsored actor tracked as Secret Blizzard, which…

Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections
01
Aug
2025

Storm-2603 Deploys Custom Malware Using BYOVD to Bypass Endpoint Protections

Check Point Research (CPR) has delved into the operations of Storm-2603, a recently identified threat actor linked to Chinese advanced…