Category: GBHackers

Cybercriminals Abusing ScreenConnect RMM Tool for Persistent Access
06
Feb
2025

Cybercriminals Abusing ScreenConnect RMM Tool for Persistent Access

Cybersecurity experts have identified an alarming trend of cybercriminals exploiting ConnectWise ScreenConnect, a widely-used Remote Monitoring and Management (RMM) tool,…

Cisco IOS SNMP Vulnerabilities Allow Attackers to Launch DoS Attacks"
06
Feb
2025

Cisco IOS SNMP Vulnerabilities Allow Attackers to Launch DoS Attacks”

Cisco has disclosed multiple vulnerabilities in its Simple Network Management Protocol (SNMP) subsystem affecting Cisco IOS, IOS XE, and IOS…

Critical Netgear Vulnerabilities Allow Hackers to Execute Remote Code
05
Feb
2025

Critical Netgear Vulnerabilities Allow Hackers to Execute Remote Code

Free Webinar – DevSecOps Hacks By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes,…

Hackers Can Exploit GPU Flaws to Gain Full Control of Your Device
05
Feb
2025

Hackers Can Exploit GPU Flaws to Gain Full Control of Your Device

Several critical vulnerabilities affecting Mali Graphics Processing Units (GPUs) have surfaced, allowing hackers to exploit flaws in GPU drivers to…

Chinese Hackers Attacking Linux Devices With New SSH Backdoor
05
Feb
2025

Chinese Hackers Attacking Linux Devices With New SSH Backdoor

A sophisticated cyber espionage campaign attributed to the Chinese hacking group DaggerFly has been identified, targeting Linux systems through an…

CISA Releases Nine Security Advisories on ICS Vulnerabilities and Exploits
05
Feb
2025

CISA Releases Nine Security Advisories on ICS Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released nine advisories targeting security vulnerabilities in Industrial Control Systems (ICS). These…

Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access
05
Feb
2025

Hackers Exploiting a Six-year-old IIS Vulnerability to Gain Remote Access

In a concerning revelation, cybersecurity firm eSentire’s Threat Response Unit (TRU) has detected active exploitation of a six-year-old vulnerability, CVE-2019-18935,…

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code
05
Feb
2025

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code

A critical vulnerability, CVE-2025-23114, has been discovered within the Veeam Updater component that poses a serious risk to organizations utilizing…

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers
05
Feb
2025

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new set of guidelines to fortify firewalls, routers, internet-facing servers,…

Cybercriminals Exploiting HTTP Client Tools to Hijack Microsoft 365 Accounts
04
Feb
2025

Cybercriminals Exploiting HTTP Client Tools to Hijack Microsoft 365 Accounts

A recent report by Proofpoint has revealed an alarming trend of cybercriminals exploiting HTTP client tools to target Microsoft 365…

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access
04
Feb
2025

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a total of 47 vulnerabilities affecting Android…

1- Click RCE Vulnerability In Voyager PHP Allow Attackers Execute Arbitrary code in Server
04
Feb
2025

1- Click RCE Vulnerability In Voyager PHP Allow Attackers Execute Arbitrary code in Server

A recently disclosed security vulnerability in the Voyager PHP package, a popular tool for managing Laravel applications, has raised significant…