Category: GBHackers

MuddyWater APT Targets CFOs via OpenSSH; Enables RDP and Scheduled Tasks
21
Aug
2025

MuddyWater APT Targets CFOs via OpenSSH; Enables RDP and Scheduled Tasks

A sophisticated spear-phishing campaign attributed to the Iranian-linked APT group MuddyWater is actively compromising CFOs and finance executives across Europe,…

Kali Vagrant Rebuilt Released with Pre-Configured Command-Line VMs
21
Aug
2025

Kali Vagrant Rebuilt Released with Pre-Configured Command-Line VMs

Kali Linux has announced a major overhaul of its Vagrant virtual machine distribution system, transitioning from HashiCorp’s Packer to the…

FBI Warns Russian State Hackers Targeting Critical Infrastructure Networking Devices
21
Aug
2025

FBI Warns Russian State Hackers Targeting Critical Infrastructure Networking Devices

The Federal Bureau of Investigation (FBI) has issued a stark warning to the public, private sector, and international partners regarding…

Commvault Backup Suite Flaws Allow Attackers to Breach On-Premises Systems
21
Aug
2025

Commvault Backup Suite Flaws Allow Attackers to Breach On-Premises Systems

Security researchers have uncovered a critical series of vulnerabilities in Commvault’s backup and data management software that could enable attackers…

New SHAMOS Malware Targets macOS Through Fake Help Sites to Steal Login Credentials
21
Aug
2025

New SHAMOS Malware Targets macOS Through Fake Help Sites to Steal Login Credentials

Cybersecurity researchers at CrowdStrike identified and thwarted a sophisticated malware campaign deploying SHAMOS, an advanced variant of the Atomic macOS…

UNC5518 Group Hacks Legitimate Sites with Fake Captcha to Deliver Malware
21
Aug
2025

UNC5518 Group Hacks Legitimate Sites with Fake Captcha to Deliver Malware

The financially motivated threat group UNC5518 has been infiltrating trustworthy websites to install ClickFix lures, which are misleading phony CAPTCHA…

MITM6 + NTLM Relay Attack Enables Full Domain Compromise
21
Aug
2025

MITM6 + NTLM Relay Attack Enables Full Domain Compromise

Cybersecurity researchers are highlighting a dangerous attack technique that combines rogue IPv6 configuration with NTLM credential relay to achieve complete…

QUIC-LEAK Vulnerability Allows Attackers to Drain Server Memory and Cause DoS
21
Aug
2025

QUIC-LEAK Vulnerability Allows Attackers to Drain Server Memory and Cause DoS

Security researchers at Imperva have disclosed a critical pre-handshake memory exhaustion vulnerability in the widely-used LSQUIC QUIC implementation that enables…

Operator of ‘Rapper Bot’ DDoS Botnet Faces Charges
21
Aug
2025

Operator of ‘Rapper Bot’ DDoS Botnet Faces Charges

Federal authorities have charged a 22-year-old Oregon man with operating one of the most powerful distributed denial-of-service (DDoS) botnets ever…

CISA Issues Four ICS Advisories on Vulnerabilities and Exploits
21
Aug
2025

CISA Issues Four ICS Advisories on Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) released four critical Industrial Control Systems (ICS) advisories on August 19, 2025, alerting…

Apple Confirms Critical 0-Day Under Active Attack – Immediate Update Urged
21
Aug
2025

Apple Confirms Critical 0-Day Under Active Attack – Immediate Update Urged

Apple has issued an emergency security update for iOS 18.6.2 and iPadOS 18.6.2 to address a critical zero-day vulnerability that…

Critical Flaw in Apache Tika PDF Parser Exposes Sensitive Data to Attackers
21
Aug
2025

Critical Flaw in Apache Tika PDF Parser Exposes Sensitive Data to Attackers

A critical XML External Entity (XXE) vulnerability has been discovered in Apache Tika’s PDF parser module, potentially allowing attackers to…