Category: GBHackers

New Phishing Scam Aims at PyPI Maintainers to Steal Login Information
25
Sep
2025

New Phishing Scam Aims at PyPI Maintainers to Steal Login Information

A fresh wave of domain-confusion phishing emails is sweeping through the Python community, once again setting its sights on PyPI…

SetupHijack Tool Abuses Race Conditions in Windows Installer to Hijack Setups
25
Sep
2025

SetupHijack Tool Abuses Race Conditions in Windows Installer to Hijack Setups

Security researchers at Hacker House have released SetupHijack, a proof-of-concept tool that exploits race conditions and insecure file handling in…

Malware Deployment via Copyright Takedown Claims by Threat Actors
25
Sep
2025

Malware Deployment via Copyright Takedown Claims by Threat Actors

Threat actors from the Lone None group are exploiting copyright takedown notices to distribute sophisticated malware, including Pure Logs Stealer…

Hackers Deploy Stealthy Malware on WordPress Sites to Gain Admin Access
25
Sep
2025

Hackers Deploy Stealthy Malware on WordPress Sites to Gain Admin Access

Attackers have stepped up their tactics by deploying stealthy backdoors disguised as legitimate WordPress components, ensuring persistent administrative access even…

Hackers Exploit Hikvision Camera Flaw to Steal Sensitive Data
25
Sep
2025

Hackers Exploit Hikvision Camera Flaw to Steal Sensitive Data

Security researchers have observed renewed exploit campaigns targeting an eight-year-old backdoor in Hikvision cameras to harvest configuration files, user lists,…

BRICKSTORM Backdoor Hits Tech and Legal Firms with Stealthy New Campaign
25
Sep
2025

BRICKSTORM Backdoor Hits Tech and Legal Firms with Stealthy New Campaign

Persistent, stealthy, and cross-platform, the BRICKSTORM backdoor has emerged as a significant threat to U.S. technology and legal organizations. Tracked…

Linux Kernel ksmbd Flaw Lets Remote Attackers Execute Arbitrary Code
25
Sep
2025

Linux Kernel ksmbd Flaw Lets Remote Attackers Execute Arbitrary Code

A critical vulnerability in the Linux Kernel’s ksmbd file sharing component allows remote attackers to execute code with kernel privileges….

NVIDIA Merlin Flaw Enables Remote Code Execution with Root Access
25
Sep
2025

NVIDIA Merlin Flaw Enables Remote Code Execution with Root Access

A critical vulnerability in NVIDIA’s Merlin Transformers4Rec library allows attackers to achieve remote code execution with root privileges. Discovered by…

Attackers Exploit BMC Firmware Vulnerabilities to Bypass Signature Verification
24
Sep
2025

Attackers Exploit BMC Firmware Vulnerabilities to Bypass Signature Verification

In January 2025, Supermicro released patches addressing critical vulnerabilities in its Baseboard Management Controller (BMC) firmware validation logic. Despite these…

Chromium-Based Browsers in Windows Domains Vulnerable to Arbitrary Extension Loads
24
Sep
2025

Chromium-Based Browsers in Windows Domains Vulnerable to Arbitrary Extension Loads

A new study has uncovered a method for silently installing custom extensions on Chromium-based browsers running in Windows domain environments….

GitHub Hosts Malware from Malwarebytes, LastPass, Citibank, SentinelOne, and More
24
Sep
2025

GitHub Hosts Malware from Malwarebytes, LastPass, Citibank, SentinelOne, and More

A large-scale campaign targeting Mac users is leveraging fake GitHub pages to distribute information-stealing malware disguised as popular legitimate applications….

Multiple Apps on Google's Firebase Platform Exposing Sensitive Data
24
Sep
2025

Multiple Apps on Google’s Firebase Platform Exposing Sensitive Data

A comprehensive security analysis has revealed a widespread vulnerability affecting Firebase-powered mobile applications, with over 150 popular apps inadvertently exposing…