Category: GBHackers

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages
16
Aug
2025

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages

A sophisticated phishing campaign targeting the maintainer of eslint-config-prettier, a widely-used npm package with over 3.5 billion downloads, resulted in…

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks
16
Aug
2025

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks

Cisco Talos researchers have uncovered a sophisticated Chinese-speaking advanced persistent threat (APT) group, designated UAT-7237, that has been actively targeting…

Cisco IOS, IOS XE, and Secure Firewall Flaws Allow Remote DoS Attacks
15
Aug
2025

Cisco IOS, IOS XE, and Secure Firewall Flaws Allow Remote DoS Attacks

Cisco Systems has issued a high-priority security advisory addressing multiple critical vulnerabilities in the Internet Key Exchange Version 2 (IKEv2)…

F5 Fixes HTTP/2 Flaw Affecting Multiple Products in Massive DoS Attacks
15
Aug
2025

F5 Fixes HTTP/2 Flaw Affecting Multiple Products in Massive DoS Attacks

F5 Networks has disclosed a new HTTP/2 vulnerability affecting multiple BIG-IP products that could allow attackers to launch denial-of-service attacks…

ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
15
Aug
2025

ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows

The popular open-source image manipulation software ImageMagick has addressed four critical security vulnerabilities discovered by Google’s artificial intelligence-powered security research…

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash
15
Aug
2025

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash

Security researchers have uncovered a sophisticated new phishing campaign that exploits the Japanese hiragana character “ん” to create deceptively authentic-looking…

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password
15
Aug
2025

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password

A significant security breach has exposed the complete source code of ERMAC V3.0, a sophisticated banking trojan that targets over…

Palo Alto GlobalProtect Vulnerability Allows Privilege Escalation via Certificate Bypass
15
Aug
2025

Palo Alto GlobalProtect Vulnerability Allows Privilege Escalation via Certificate Bypass

A newly disclosed vulnerability in Palo Alto Networks’ GlobalProtect application could allow attackers to escalate privileges and install malicious software…

VirtualBox 7.2 Adds Windows 11/Arm VM Support and Key Bug Fixes
15
Aug
2025

VirtualBox 7.2 Adds Windows 11/Arm VM Support and Key Bug Fixes

Oracle has released VirtualBox 7.2.0, a major update that significantly expands ARM virtualization capabilities and introduces comprehensive Windows 11/ARM support….

HexStrike AI Links ChatGPT, Claude, and Copilot to 150+ Security Tools
15
Aug
2025

HexStrike AI Links ChatGPT, Claude, and Copilot to 150+ Security Tools

HexStrike AI, the leading autonomous cybersecurity framework, today announced seamless integration with ChatGPT, Claude, and GitHub Copilot, enabling these AI…

Cisco Secure Firewall Snort 3 Vulnerability Enable DoS Attacks
15
Aug
2025

Cisco Secure Firewall Snort 3 Vulnerability Enable DoS Attacks

A critical vulnerability discovered in Cisco’s Secure Firewall Threat Defense Software has been identified as CVE-2025-20217, posing significant risks to…

HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks
15
Aug
2025

HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks

Security researchers have disclosed a critical vulnerability in the HTTP/2 protocol that could enable massive distributed denial-of-service (DDoS) attacks, potentially…