Category: GBHackers

Food Delivery Robots Vulnerable to Hacks That Redirect Orders
01
Sep
2025

Food Delivery Robots Vulnerable to Hacks That Redirect Orders

A startling vulnerability in Pudu Robotics’ management APIs that allowed anyone with minimal technical skill to seize control of the…

Apple May Drop Physical SIM Card in iPhone 17
01
Sep
2025

Apple May Drop Physical SIM Card in iPhone 17

Apple appears poised to remove the physical SIM card slot from its upcoming iPhone 17 models in more countries, with…

Plain Text Storage of Vulnerability Exploit Helm Values
01
Sep
2025

Plain Text Storage of Vulnerability Exploit Helm Values

A high-severity vulnerability in SUSE’s Fleet, a GitOps management tool for Kubernetes clusters, has been disclosed by security researcher samjustus…

Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware
01
Sep
2025

Hackers Exploit Email Marketing Platforms to Deliver Hidden Malware

In recent months, Trustwave SpiderLabs—a LevelBlue company renowned for its threat intelligence and incident response services—has observed a marked uptick…

MediaTek Issues Security Update to Patch Multiple Chipset Flaws
01
Sep
2025

MediaTek Issues Security Update to Patch Multiple Chipset Flaws

MediaTek today published its September 2025 Product Security Bulletin, disclosing and remediating a series of critical and moderate vulnerabilities in…

Fraudulent Scholarship Apps Target Students in “Defarud” Scam Campaign
01
Sep
2025

Fraudulent Scholarship Apps Target Students in “Defarud” Scam Campaign

An Android malware tracker named SikkahBot, active since July 2024 and explicitly targeting students in Bangladesh. Disguised as applications from…

Salesforce Publishes Forensic Guide After Series of Cyberattacks
01
Sep
2025

Salesforce Publishes Forensic Guide After Series of Cyberattacks

Salesforce has published a comprehensive forensic investigation guide aimed at empowering organizations to detect, analyze, and remediate security incidents within…

Critical ImageMagick Vulnerability Allows Remote Code Execution
01
Sep
2025

Critical ImageMagick Vulnerability Allows Remote Code Execution

A critical security vulnerability has been discovered in ImageMagick, the widely used open-source image processing software, that could allow attackers to execute…

Windows 11 25H2 Preview Build Released: Here’s What’s New
01
Sep
2025

Windows 11 25H2 Preview Build Released: Here’s What’s New

Microsoft has begun rolling out the Windows 11, version 25H2 (Build 26200.5074) preview to the Release Preview Channel, offering enthusiasts…

Hackers Exploit Windows Defender Policies to Shut Down EDR Agents
01
Sep
2025

Hackers Exploit Windows Defender Policies to Shut Down EDR Agents

Cybercriminals are now weaponizing Windows Defender Application Control (WDAC) policies to disable Endpoint Detection and Response (EDR) agents en masse….

APT Groups Weaponize Infostealer Malware in Precision Attacks
01
Sep
2025

APT Groups Weaponize Infostealer Malware in Precision Attacks

The cybersecurity landscape has witnessed a dangerous evolution as Advanced Persistent Threat (APT) groups increasingly weaponize opportunistic infostealer malware for…

Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files
01
Sep
2025

Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files

Red Hat has disclosed a critical security flaw in the Udisks daemon that allows unprivileged users to exploit an out-of-bounds…