Category: GBHackers

Critical SUSE Manager Vulnerability Allows Remote Command Execution as Root
31
Jul
2025

Critical SUSE Manager Vulnerability Allows Remote Command Execution as Root

A critical security vulnerability has been discovered in SUSE Manager that enables attackers to execute arbitrary commands with root privileges…

NOVABLIGHT Masquerades as Educational Tool to Steal Login Credentials and Compromise Crypto Wallets
31
Jul
2025

NOVABLIGHT Masquerades as Educational Tool to Steal Login Credentials and Compromise Crypto Wallets

A newly analyzed Malware-as-a-Service (MaaS) infostealer, NOVABLIGHT, has emerged as a significant cybersecurity threat, targeting unsuspecting users with advanced data…

UNC2891 Hackers Breach ATMs Using Raspberry Pi Devices for Network Access
31
Jul
2025

UNC2891 Hackers Breach ATMs Using Raspberry Pi Devices for Network Access

A Raspberry Pi device that was directly attached to an internal network switch was used by the financially motivated threat…

North Korean APT Hackers Compromise CI/CD Pipelines to Steal Sensitive Data
31
Jul
2025

North Korean APT Hackers Compromise CI/CD Pipelines to Steal Sensitive Data

Sonatype’s automated malware detection systems have exposed a large-scale and ongoing cyber infiltration campaign orchestrated by the North Korea-backed Lazarus…

CrushFTP Hit by Critical 0-Day RCE Vulnerability
31
Jul
2025

CrushFTP Hit by Critical 0-Day RCE Vulnerability

Security researchers have disclosed a critical zero-day vulnerability in CrushFTP, a popular file transfer server solution, that allows attackers to…

Palo Alto Networks Announces $25 Billion Acquisition of CyberArk
31
Jul
2025

Palo Alto Networks Announces $25 Billion Acquisition of CyberArk

Cybersecurity giant Palo Alto Networks announced a landmark $25 billion acquisition of identity security leader CyberArk on July 30, 2025,…

Hackers Allegedly Breach Nokia’s Internal Network
31
Jul
2025

Hackers Allegedly Breach Nokia’s Internal Network

A cybercriminal group has allegedly infiltrated Nokia’s internal network through a vulnerable third-party contractor, potentially exposing sensitive information belonging to…

APT Hackers Target Maritime and Shipping Industry for Ransomware Attacks
30
Jul
2025

APT Hackers Target Maritime and Shipping Industry for Ransomware Attacks

The maritime sector, which facilitates approximately 90% of international trade, is facing an unprecedented surge in sophisticated cyberattacks from advanced…

Apple Patches Multiple Vulnerabilities, Including Safari Vulnerability Abused in Chrome 0-Day Attacks
30
Jul
2025

Apple Patches Multiple Vulnerabilities, Including Safari Vulnerability Abused in Chrome 0-Day Attacks

Apple has released a comprehensive set of security updates across its entire product ecosystem on July 29, 2025, addressing multiple…

LLM Honeypots Can Deceive Threat Actors into Exposing Binaries and Known Exploits
30
Jul
2025

LLM Honeypots Can Deceive Threat Actors into Exposing Binaries and Known Exploits

Large language model (LLM)-powered honeypots are becoming increasingly complex instruments for luring and examining threat actors in the rapidly changing…

Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media
30
Jul
2025

Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media

A sophisticated cyberattack campaign disrupted the Russian IT industry and entities in several other countries, leveraging advanced evasion techniques to…

Qilin Ransomware Uses TPwSav.sys Driver to Bypass EDR Security Measures
30
Jul
2025

Qilin Ransomware Uses TPwSav.sys Driver to Bypass EDR Security Measures

Cybercriminals affiliated with the Qilin ransomware-as-a-service (RaaS) operation have demonstrated advanced evasion techniques by exploiting a previously undocumented vulnerable driver,…