Category: GBHackers

Threat Actors Using .hwp Files to Distribute RokRAT Malware and Evade Detection Mechanisms
24
Jul
2025

Threat Actors Using .hwp Files to Distribute RokRAT Malware and Evade Detection Mechanisms

The AhnLab Security intelligence Center (ASEC) has identified a sophisticated campaign where threat actors are leveraging Hangul Word Processor (.hwp)…

NoName057(16) Hackers Target 3,700 Unique Devices Over the Last 13 Months
24
Jul
2025

NoName057(16) Hackers Target 3,700 Unique Devices Over the Last 13 Months

The pro-Russian hacktivist collective NoName057(16) has been documented executing distributed denial-of-service (DDoS) attacks against over 3,700 unique hosts, predominantly targeting…

Splunk Guide to Detect, Mitigate, and Respond to the CitrixBleed 2 Vulnerability
24
Jul
2025

Splunk Guide to Detect, Mitigate, and Respond to the CitrixBleed 2 Vulnerability

The cybersecurity landscape is grappling with CVE-2025-5777, informally known as “CitrixBleed 2,” an out-of-bounds memory read vulnerability affecting Citrix NetScaler…

SonicWall SMA 100 Vulnerabilities Allow Remote Execution of Arbitrary JavaScript
24
Jul
2025

SonicWall SMA 100 Vulnerabilities Allow Remote Execution of Arbitrary JavaScript

Cybersecurity vendor SonicWall issued a critical advisory highlighting three serious vulnerabilities affecting its Secure Mobile Access (SMA) 100 series appliances….

GitLab Publishes Security Update Addressing Several Vulnerabilities
24
Jul
2025

GitLab Publishes Security Update Addressing Several Vulnerabilities

GitLab has released critical security patches addressing six vulnerabilities across its Community Edition (CE) and Enterprise Edition (EE) platforms, with…

Researchers Exploit Cursor Background Agents to Take Over Amazon EC2 Instance
24
Jul
2025

Researchers Exploit Cursor Background Agents to Take Over Amazon EC2 Instance

Security researchers have successfully exploited vulnerabilities in Cursor’s Background Agents to gain unauthorized access to an Amazon EC2 instance, demonstrating…

AI-Driven Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy
24
Jul
2025

AI-Driven Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy

Researchers have introduced WhoFi, an AI-powered deep learning pipeline that leverages Wi-Fi Channel State Information (CSI) for person re-identification (Re-ID),…

Chinese Hackers Launch Targeted Campaign to Infect Windows Systems with Ghost RAT and PhantomNet Malware
24
Jul
2025

Chinese Hackers Launch Targeted Campaign to Infect Windows Systems with Ghost RAT and PhantomNet Malware

Zscaler ThreatLabz, in collaboration with TibCERT, has uncovered two linked attack campaigns dubbed Operation GhostChat and Operation PhantomPrayers, attributed with…

Google Introduces OSS Rebuild to Boost Security in Open-Source Package Ecosystems
24
Jul
2025

Google Introduces OSS Rebuild to Boost Security in Open-Source Package Ecosystems

Google has unveiled OSS Rebuild, a pioneering project designed to enhance trust in package registries by independently reproducing upstream artifacts….

Metasploit Module Released to Exploit SharePoint 0-Day Vulnerabilities
24
Jul
2025

Metasploit Module Released to Exploit SharePoint 0-Day Vulnerabilities

Security researchers have released a Metasploit exploitation module targeting critical zero-day vulnerabilities in Microsoft SharePoint Server, marking a significant escalation…

TP-Link Network Video Recorder Vulnerability Enables Arbitrary Command Execution
24
Jul
2025

TP-Link Network Video Recorder Vulnerability Enables Arbitrary Command Execution

TP-Link has disclosed critical security vulnerabilities affecting two of its VIGI Network Video Recorder models, potentially allowing attackers to execute…

AWS Client VPN for Windows Vulnerability Could Allow Privilege Escalation
24
Jul
2025

AWS Client VPN for Windows Vulnerability Could Allow Privilege Escalation

Amazon Web Services has disclosed a critical security vulnerability in its Client VPN software for Windows that could allow non-administrative…