Category: GBHackers

Google Chrome Vulnerabilities Enable Arbitrary Code Execution – Update Now!
18
Jun
2025

Google Chrome Vulnerabilities Enable Arbitrary Code Execution – Update Now!

Google has released a crucial security update for its Chrome browser, addressing multiple high-severity vulnerabilities that could allow attackers to…

BlackHat AI Tool WormGPT Enhanced with Grok and Mixtral
18
Jun
2025

BlackHat AI Tool WormGPT Enhanced with Grok and Mixtral

The rapid evolution of large language models (LLMs) has not only transformed legitimate industries but has also found its way…

Qilin Ransomware Emerges as a Major Threat Targeting Windows, Linux, and ESXi Systems
18
Jun
2025

Qilin Ransomware Emerges as a Major Threat Targeting Windows, Linux, and ESXi Systems

Qilin ransomware has emerged as a formidable force, rapidly ascending to prominence amid the collapse of once-dominant groups like RansomHub…

Critical Privilege Escalation Flaws Grant Full Root Access on Multiple Linux Distros
18
Jun
2025

Critical Privilege Escalation Flaws Grant Full Root Access on Multiple Linux Distros

The Qualys Threat Research Unit (TRU) has uncovered two interconnected local privilege escalation (LPE) vulnerabilities—CVE-2025-6018 and CVE-2025-6019—that together enable attackers…

Hackers Claim Breach of Scania Financial Services, Leak Sensitive Data
18
Jun
2025

Hackers Claim Breach of Scania Financial Services, Leak Sensitive Data

A significant data breach has rocked Sweden’s Scania Financial Services, as a threat actor operating under the alias “hensi” claims…

Google's Gerrit Platform Flaw Exposes 18 Google Projects, Including ChromiumOS, to Hackers
18
Jun
2025

Google’s Gerrit Platform Flaw Exposes 18 Google Projects, Including ChromiumOS, to Hackers

A critical vulnerability, dubbed “GerriScary,” has been discovered in Google’s Gerrit code-collaboration platform, putting at least 18 major Google projects—including…

CISA Alerts to Active Exploits of Linux Kernel Ownership Flaw
18
Jun
2025

CISA Alerts to Active Exploits of Linux Kernel Ownership Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding active exploitation of a critical Linux kernel vulnerability,…

Citrix NetScaler ADC & Gateway Flaws Expose Sensitive Data to Hackers
18
Jun
2025

Citrix NetScaler ADC & Gateway Flaws Expose Sensitive Data to Hackers

Two critical vulnerabilities have been discovered in Citrix NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway), potentially…

Veeam Vulnerabilities Expose Backup Servers to Remote Attacks
18
Jun
2025

Veeam Vulnerabilities Expose Backup Servers to Remote Attacks

Veeam, a leading provider of data protection and backup solutions, disclosed three critical vulnerabilities affecting its widely deployed backup software….

XDSpy Threat Actors Exploit Windows LNK Zero-Day Vulnerability to Target Windows System Users
18
Jun
2025

XDSpy Threat Actors Exploit Windows LNK Zero-Day Vulnerability to Target Windows System Users

The XDSpy threat actor has been identified as exploiting a Windows LNK zero-day vulnerability, dubbed ZDI-CAN-25373, to target governmental entities…

New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script
17
Jun
2025

New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script

A recently uncovered malware campaign has revealed a highly sophisticated, multi-stage infection process utilizing heavily obfuscated Visual Basic Script (VBS)…

New Sorillus RAT Targets European Organizations Through Tunneling Services
17
Jun
2025

New Sorillus RAT Targets European Organizations Through Tunneling Services

An important development discovered in March 2025 by Orange Cyberdefense’s Managed Threat Detection teams in Belgium was that a European…