Category: GBHackers

Critical Privilege Escalation Flaws Grant Full Root Access on Multiple Linux Distros
18
Jun
2025

Critical Privilege Escalation Flaws Grant Full Root Access on Multiple Linux Distros

The Qualys Threat Research Unit (TRU) has uncovered two interconnected local privilege escalation (LPE) vulnerabilities—CVE-2025-6018 and CVE-2025-6019—that together enable attackers…

Hackers Claim Breach of Scania Financial Services, Leak Sensitive Data
18
Jun
2025

Hackers Claim Breach of Scania Financial Services, Leak Sensitive Data

A significant data breach has rocked Sweden’s Scania Financial Services, as a threat actor operating under the alias “hensi” claims…

Google's Gerrit Platform Flaw Exposes 18 Google Projects, Including ChromiumOS, to Hackers
18
Jun
2025

Google’s Gerrit Platform Flaw Exposes 18 Google Projects, Including ChromiumOS, to Hackers

A critical vulnerability, dubbed “GerriScary,” has been discovered in Google’s Gerrit code-collaboration platform, putting at least 18 major Google projects—including…

CISA Alerts to Active Exploits of Linux Kernel Ownership Flaw
18
Jun
2025

CISA Alerts to Active Exploits of Linux Kernel Ownership Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding active exploitation of a critical Linux kernel vulnerability,…

Citrix NetScaler ADC & Gateway Flaws Expose Sensitive Data to Hackers
18
Jun
2025

Citrix NetScaler ADC & Gateway Flaws Expose Sensitive Data to Hackers

Two critical vulnerabilities have been discovered in Citrix NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway), potentially…

Veeam Vulnerabilities Expose Backup Servers to Remote Attacks
18
Jun
2025

Veeam Vulnerabilities Expose Backup Servers to Remote Attacks

Veeam, a leading provider of data protection and backup solutions, disclosed three critical vulnerabilities affecting its widely deployed backup software….

XDSpy Threat Actors Exploit Windows LNK Zero-Day Vulnerability to Target Windows System Users
18
Jun
2025

XDSpy Threat Actors Exploit Windows LNK Zero-Day Vulnerability to Target Windows System Users

The XDSpy threat actor has been identified as exploiting a Windows LNK zero-day vulnerability, dubbed ZDI-CAN-25373, to target governmental entities…

New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script
17
Jun
2025

New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script

A recently uncovered malware campaign has revealed a highly sophisticated, multi-stage infection process utilizing heavily obfuscated Visual Basic Script (VBS)…

New Sorillus RAT Targets European Organizations Through Tunneling Services
17
Jun
2025

New Sorillus RAT Targets European Organizations Through Tunneling Services

An important development discovered in March 2025 by Orange Cyberdefense’s Managed Threat Detection teams in Belgium was that a European…

New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper
17
Jun
2025

New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper

The two new variants of the KimJongRAT stealer have emerged, showcasing the persistent and evolving nature of this malicious tool…

New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data
17
Jun
2025

New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data

The Acronis Threat Research Unit has identified new variants of Chaos RAT, a remote administration tool (RAT) that has evolved…

Weaponized Research Papers Delivering Malware Through Password-Protected Documents
17
Jun
2025

Weaponized Research Papers Delivering Malware Through Password-Protected Documents

The AhnLab Security Intelligence Center (ASEC) recently made the concerning revelation that the infamous Kimsuky hacking organization was connected to…