Category: GBHackers

ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
15
Aug
2025

ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows

The popular open-source image manipulation software ImageMagick has addressed four critical security vulnerabilities discovered by Google’s artificial intelligence-powered security research…

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash
15
Aug
2025

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash

Security researchers have uncovered a sophisticated new phishing campaign that exploits the Japanese hiragana character “ん” to create deceptively authentic-looking…

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password
15
Aug
2025

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password

A significant security breach has exposed the complete source code of ERMAC V3.0, a sophisticated banking trojan that targets over…

Palo Alto GlobalProtect Vulnerability Allows Privilege Escalation via Certificate Bypass
15
Aug
2025

Palo Alto GlobalProtect Vulnerability Allows Privilege Escalation via Certificate Bypass

A newly disclosed vulnerability in Palo Alto Networks’ GlobalProtect application could allow attackers to escalate privileges and install malicious software…

VirtualBox 7.2 Adds Windows 11/Arm VM Support and Key Bug Fixes
15
Aug
2025

VirtualBox 7.2 Adds Windows 11/Arm VM Support and Key Bug Fixes

Oracle has released VirtualBox 7.2.0, a major update that significantly expands ARM virtualization capabilities and introduces comprehensive Windows 11/ARM support….

HexStrike AI Links ChatGPT, Claude, and Copilot to 150+ Security Tools
15
Aug
2025

HexStrike AI Links ChatGPT, Claude, and Copilot to 150+ Security Tools

HexStrike AI, the leading autonomous cybersecurity framework, today announced seamless integration with ChatGPT, Claude, and GitHub Copilot, enabling these AI…

Cisco Secure Firewall Snort 3 Vulnerability Enable DoS Attacks
15
Aug
2025

Cisco Secure Firewall Snort 3 Vulnerability Enable DoS Attacks

A critical vulnerability discovered in Cisco’s Secure Firewall Threat Defense Software has been identified as CVE-2025-20217, posing significant risks to…

HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks
15
Aug
2025

HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks

Security researchers have disclosed a critical vulnerability in the HTTP/2 protocol that could enable massive distributed denial-of-service (DDoS) attacks, potentially…

Cisco Secure Firewall Vulnerability Lets Attackers Execute Remote Shell Commands
15
Aug
2025

Cisco Secure Firewall Vulnerability Lets Attackers Execute Remote Shell Commands

Cisco has disclosed a critical security vulnerability in its Secure Firewall Management Center software that could allow unauthenticated attackers to…

Ransomware Actors Combine Legitimate Tools with Custom Malware to Evade Detection
15
Aug
2025

Ransomware Actors Combine Legitimate Tools with Custom Malware to Evade Detection

Operators behind the Crypto24 strain are employing highly coordinated, multi-stage attacks that blend legitimate system tools with bespoke malware to…

Threat Actors Leverage CrossC2 to Extend Cobalt Strike to Linux and macOS
14
Aug
2025

Threat Actors Leverage CrossC2 to Extend Cobalt Strike to Linux and macOS

JPCERT/CC verified a number of events in which threat actors were seen using CrossC2, an unofficial extension tool that creates…

Multi-Stage Malware Framework Targeting Windows Systems
14
Aug
2025

Multi-Stage Malware Framework Targeting Windows Systems

Cisco Talos researchers have uncovered an aggressive malware campaign active since early 2025, deploying a sophisticated multi-stage framework dubbed PS1Bot,…