Category: GBHackers

NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols
24
Jun
2025

NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols

The National Cyber Security Centre (NCSC) has issued a critical alert regarding a newly identified malware, dubbed SHOE RACK, which…

Critical Convoy Flaw Allows Remote Code Execution on Servers
24
Jun
2025

Critical Convoy Flaw Allows Remote Code Execution on Servers

Credential Abuse Unmasked Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our…

OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot
24
Jun
2025

OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot

A newly disclosed security vulnerability in OPPO’s widely used Clone Phone app has raised significant concerns over user privacy, as…

North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks
24
Jun
2025

North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks

Cybersecurity researchers and targeted individuals have reported a highly sophisticated scam orchestrated by suspected North Korean hackers. This attack, disguised…

LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks
24
Jun
2025

LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks

Security researchers at SecurityScorecard have uncovered a sprawling cyber-espionage campaign orchestrated by the LapDogs Operational Relay Box (ORB) Network, a…

Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers
24
Jun
2025

Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers

The Wordfence Threat Intelligence Team uncovered a sophisticated malware campaign during a routine site cleanup, revealing a family of malicious…

OWASP Launches AI Testing Guide to Uncover Vulnerabilities in AI Systems
24
Jun
2025

OWASP Launches AI Testing Guide to Uncover Vulnerabilities in AI Systems

As artificial intelligence (AI) becomes a cornerstone of modern industry, the Open Web Application Security Project (OWASP) has announced the…

Aviatrix Cloud Controller Flaw Enables Remote Code Execution via Authentication Bypass
24
Jun
2025

Aviatrix Cloud Controller Flaw Enables Remote Code Execution via Authentication Bypass

A Mandiant Red Team engagement has uncovered two critical vulnerabilities in Aviatrix Controller—cloud networking software used to manage multi-cloud environments….

WinRAR Vulnerability Exploited with Malicious Archives to Execute Code
24
Jun
2025

WinRAR Vulnerability Exploited with Malicious Archives to Execute Code

A newly disclosed vulnerability in RARLAB’s WinRAR, the widely used file compression utility for Windows, has put millions of users…

Notepad++ Vulnerability Allows Full System Takeover — PoC Released
24
Jun
2025

Notepad++ Vulnerability Allows Full System Takeover — PoC Released

A critical privilege escalation vulnerability (CVE-2025-49144) in Notepad++ v8.8.1 enables attackers to achieve full system control through a supply-chain attack….

New Echo Chamber Attack Breaks AI Models Using Indirect Prompts
24
Jun
2025

New Echo Chamber Attack Breaks AI Models Using Indirect Prompts

A groundbreaking AI jailbreak technique, dubbed the “Echo Chamber Attack,” has been uncovered by researchers at Neural Trust, exposing a…

RapperBot Targets DVRs to Hijack Surveillance Cameras and Record Video
24
Jun
2025

RapperBot Targets DVRs to Hijack Surveillance Cameras and Record Video

When the NICT CSRI analysis team presented their three-year investigation into the RapperBot virus at Botconf 1, an international conference…