Category: GBHackers

ScriptCase Vulnerabilities Allow Remote Code Execution and Full Server Compromise
07
Jul
2025

ScriptCase Vulnerabilities Allow Remote Code Execution and Full Server Compromise

Two critical vulnerabilities have been discovered in ScriptCase, a popular low-code PHP web application generator, which puts thousands of servers…

PoC Released for Linux Privilege Escalation Flaw in udisksd and libblockdev
07
Jul
2025

PoC Released for Linux Privilege Escalation Flaw in udisksd and libblockdev

Security researchers disclosed a critical local privilege escalation (LPE) vulnerability affecting Fedora, SUSE, and other major Linux distributions. The flaw,…

Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence
04
Jul
2025

Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence

Security researchers have discovered novel ways to identify and take advantage of Microsoft Azure Arc in business settings, which is…

Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware
04
Jul
2025

Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware

Cybercriminals are increasingly weaponizing legitimate software installer frameworks like Inno Setup to distribute malware, turning user-friendly tools into covert vehicles…

Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning
04
Jul
2025

Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning

A critical vulnerability, tracked as CVE-2025-49826, has been discovered and addressed in the popular React-based web framework, Next.js. The flaw, present…

SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are
04
Jul
2025

SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are

Every security practitioner knows that employees are the weakest link in an organization, butthis is no longer the case. SquareX’s…

Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations
04
Jul
2025

Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations

A newly disclosed vulnerability, CVE-2025-46647, has been identified in the openid-connect plugin of Apache APISIX, a widely used open-source API gateway….

Malicious SEO Plugins on WordPress Can Lead to Site Takeover
04
Jul
2025

Malicious SEO Plugins on WordPress Can Lead to Site Takeover

A new wave of cyberattacks is targeting WordPress websites through malicious SEO plugins that can lead to complete site takeover….

Instagram Now Rotating TLS Certificates Daily with 1-Week Validity
04
Jul
2025

Instagram Now Rotating TLS Certificates Daily with 1-Week Validity

Instagram has begun rotating its TLS certificates on a daily basis, with each certificate valid for just over a week….

Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence
04
Jul
2025

Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence

Scattered Spider, also tracked under aliases such as UNC3944, Scatter Swine, and Muddled Libra, has emerged as a formidable financially…

Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
04
Jul
2025

Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions

A security researcher has uncovered a significant vulnerability affecting Lenovo computers: a writable file within the Windows directory that can…

Critical HIKVISION applyCT Flaw Allows Remote Code Execution
04
Jul
2025

Critical HIKVISION applyCT Flaw Allows Remote Code Execution

A newly disclosed vulnerability, tracked as CVE-2025-34067, has been identified in HIKVISION’s widely deployed security management platform, applyCT (also known as…