Category: GBHackers

Hackers Exploit Windows Defender Policies to Shut Down EDR Agents
01
Sep
2025

Hackers Exploit Windows Defender Policies to Shut Down EDR Agents

Cybercriminals are now weaponizing Windows Defender Application Control (WDAC) policies to disable Endpoint Detection and Response (EDR) agents en masse….

APT Groups Weaponize Infostealer Malware in Precision Attacks
01
Sep
2025

APT Groups Weaponize Infostealer Malware in Precision Attacks

The cybersecurity landscape has witnessed a dangerous evolution as Advanced Persistent Threat (APT) groups increasingly weaponize opportunistic infostealer malware for…

Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files
01
Sep
2025

Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files

Red Hat has disclosed a critical security flaw in the Udisks daemon that allows unprivileged users to exploit an out-of-bounds…

Netskope Windows Client Vulnerability Enables Privilege Escalation via Rogue Server
31
Aug
2025

Netskope Windows Client Vulnerability Enables Privilege Escalation via Rogue Server

A serious security vulnerability in Netskope’s Windows client has been discovered that could allow attackers to escalate privileges from a…

Vulnerabilities in Sitecore CMS Platform Allow Excute Arbitrary Code Remotely
31
Aug
2025

Vulnerabilities in Sitecore CMS Platform Allow Excute Arbitrary Code Remotely

Security researchers at watchTowr Labs have uncovered a devastating chain of vulnerabilities in Sitecore Experience Platform that could allow attackers…

AI Waifu RAT Exploits Users with Advanced Social Engineering Tactics
31
Aug
2025

AI Waifu RAT Exploits Users with Advanced Social Engineering Tactics

A sophisticated new malware campaign has emerged that weaponizes artificial intelligence and social engineering to target niche online communities. Security…

Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach
30
Aug
2025

Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach

A sophisticated voice phishing operation has emerged as a significant threat to organizations worldwide, with cybercriminals successfully infiltrating Salesforce environments…

QNAP Flaw Allows Attackers to Bypass Authentication
30
Aug
2025

QNAP Flaw Allows Attackers to Bypass Authentication

QNAP Systems has released security patches to address multiple vulnerabilities affecting QVR firmware in legacy VioStor Network Video Recorder (NVR)…

Citrix 0-Day Flaw Under Active Exploitation Since May
30
Aug
2025

Citrix 0-Day Flaw Under Active Exploitation Since May

Security researcher Kevin Beaumont has revealed alarming details about CVE-2025-6543, a critical Citrix NetScaler vulnerability that was actively exploited as…

Amazon Takes Down Russian APT29 Infrastructure Targeting Users
30
Aug
2025

Amazon Takes Down Russian APT29 Infrastructure Targeting Users

Amazon’s cybersecurity team has successfully disrupted a sophisticated watering hole campaign orchestrated by APT29, a notorious hacking group linked to…

WhatsApp Zero-Day Vulnerability Exploited with 0-Click Attacks to Hack Apple Devices
29
Aug
2025

WhatsApp Zero-Day Vulnerability Exploited with 0-Click Attacks to Hack Apple Devices

WhatsApp has issued a critical security advisory addressing a newly discovered zero-day vulnerability, tracked as CVE-2025-55177, which has been exploited…

Popular Nx Packages Compromised by Credential-Stealing Malware
29
Aug
2025

Popular Nx Packages Compromised by Credential-Stealing Malware

A widespread supply chain attack on the popular Nx build system has compromised dozens of high-traffic packages, exposing sensitive credentials…