Category: GBHackers

Netskope Windows Client Vulnerability Enables Privilege Escalation via Rogue Server
31
Aug
2025

Netskope Windows Client Vulnerability Enables Privilege Escalation via Rogue Server

A serious security vulnerability in Netskope’s Windows client has been discovered that could allow attackers to escalate privileges from a…

Vulnerabilities in Sitecore CMS Platform Allow Excute Arbitrary Code Remotely
31
Aug
2025

Vulnerabilities in Sitecore CMS Platform Allow Excute Arbitrary Code Remotely

Security researchers at watchTowr Labs have uncovered a devastating chain of vulnerabilities in Sitecore Experience Platform that could allow attackers…

AI Waifu RAT Exploits Users with Advanced Social Engineering Tactics
31
Aug
2025

AI Waifu RAT Exploits Users with Advanced Social Engineering Tactics

A sophisticated new malware campaign has emerged that weaponizes artificial intelligence and social engineering to target niche online communities. Security…

Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach
30
Aug
2025

Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach

A sophisticated voice phishing operation has emerged as a significant threat to organizations worldwide, with cybercriminals successfully infiltrating Salesforce environments…

QNAP Flaw Allows Attackers to Bypass Authentication
30
Aug
2025

QNAP Flaw Allows Attackers to Bypass Authentication

QNAP Systems has released security patches to address multiple vulnerabilities affecting QVR firmware in legacy VioStor Network Video Recorder (NVR)…

Citrix 0-Day Flaw Under Active Exploitation Since May
30
Aug
2025

Citrix 0-Day Flaw Under Active Exploitation Since May

Security researcher Kevin Beaumont has revealed alarming details about CVE-2025-6543, a critical Citrix NetScaler vulnerability that was actively exploited as…

Amazon Takes Down Russian APT29 Infrastructure Targeting Users
30
Aug
2025

Amazon Takes Down Russian APT29 Infrastructure Targeting Users

Amazon’s cybersecurity team has successfully disrupted a sophisticated watering hole campaign orchestrated by APT29, a notorious hacking group linked to…

WhatsApp Zero-Day Vulnerability Exploited with 0-Click Attacks to Hack Apple Devices
29
Aug
2025

WhatsApp Zero-Day Vulnerability Exploited with 0-Click Attacks to Hack Apple Devices

WhatsApp has issued a critical security advisory addressing a newly discovered zero-day vulnerability, tracked as CVE-2025-55177, which has been exploited…

Popular Nx Packages Compromised by Credential-Stealing Malware
29
Aug
2025

Popular Nx Packages Compromised by Credential-Stealing Malware

A widespread supply chain attack on the popular Nx build system has compromised dozens of high-traffic packages, exposing sensitive credentials…

VS Code Marketplace Abused by Threat Actors to Deliver Malware via Trusted Extensions
29
Aug
2025

VS Code Marketplace Abused by Threat Actors to Deliver Malware via Trusted Extensions

A recently uncovered vulnerability in the Visual Studio Code (VS Code) Marketplace has allowed malicious actors to hijack discontinued extension…

Weaponized PDFs and LNK Files Used in Windows Attacks
29
Aug
2025

Weaponized PDFs and LNK Files Used in Windows Attacks

A clandestine campaign in which threat actors are weaponizing a legitimate-looking PDF document, titled “국가정보연구회 소식지 (52호)” (National Intelligence Research…

AppSuite PDF Editor Exploit Lets Hackers Run Arbitrary Commands
29
Aug
2025

AppSuite PDF Editor Exploit Lets Hackers Run Arbitrary Commands

A sophisticated backdoor in AppSuite PDF Editor that enables threat actors to execute arbitrary commands on compromised Windows systems. Initially…