Category: GBHackers

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data
10
Feb
2025

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data

Serious vulnerabilities in Zimbra Collaboration Suite (ZCS), a popular enterprise email and collaboration platform, have raised alarm in the cybersecurity…

Tor Browser 14.0.6 Released, What’s New!
10
Feb
2025

Tor Browser 14.0.6 Released, What’s New!

Free Webinar – Supply Chain Attack Prevention Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers….

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released
10
Feb
2025

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious cybersecurity concerns. Identified as CVE-2024-12754 and…

UK Forces Apple Create Global Backdoor to Spy on Encrypted iCloud Data
08
Feb
2025

UK Forces Apple Create Global Backdoor to Spy on Encrypted iCloud Data

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all encrypted content stored in its iCloud…

A Novel Defense Against Backdoor Attacks
07
Feb
2025

A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is transmitted by focusing on the meaning…

Real-World AD Breaches and the Future of Cybersecurity
07
Feb
2025

Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning and automation capabilities to simulate sophisticated…

Cybercriminals Target IIS Servers to Spread BadIIS Malware
07
Feb
2025

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services (IIS) servers by threat actors deploying…

Developers Beware! Malicious ML Models Found on Hugging Face Platform
07
Feb
2025

Developers Beware! Malicious ML Models Found on Hugging Face Platform

In a concerning development for the machine learning (ML) community, researchers from ReversingLabs have uncovered malicious ML models on the…

Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool
07
Feb
2025

Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool

The National Security Agency (NSA) has officially released Ghidra 11.3, the latest iteration of its open-source software reverse engineering (SRE)…

New Scareware Attack Targeting Mobile Users to Deploy Malicious Antivirus Apps
07
Feb
2025

New Scareware Attack Targeting Mobile Users to Deploy Malicious Antivirus Apps

A new wave of scareware attacks has emerged, targeting unsuspecting mobile users with fake antivirus applications designed to exploit fear…

Hackers Leveraging Image & Video Attachments to Deliver Malware
07
Feb
2025

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques like steganography and social engineering. These…

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows
07
Feb
2025

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat to IT administrators and developers worldwide….