Category: GBHackers

Hundreds of TeslaMate Servers Expose Real-Time Vehicle Data
18
Aug
2025

Hundreds of TeslaMate Servers Expose Real-Time Vehicle Data

A security researcher has discovered that hundreds of self-hosted TeslaMate servers are exposing sensitive Tesla vehicle data to the public…

Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution
18
Aug
2025

Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution

A critical vulnerability in Rockwell Automation’s ControlLogix Ethernet modules has been discovered that could allow remote attackers to execute malicious…

Critical PostgreSQL Flaws Allow Code Injection During Restoration
18
Aug
2025

Critical PostgreSQL Flaws Allow Code Injection During Restoration

The PostgreSQL Global Development Group released emergency security updates on August 14, 2025, addressing three critical vulnerabilities that enable code…

Elastic EDR 0-Day Flaw Lets Hackers Evade Detection, Run Malware, and Trigger BSOD
17
Aug
2025

Elastic EDR 0-Day Flaw Lets Hackers Evade Detection, Run Malware, and Trigger BSOD

AshES Cybersecurity has disclosed a severe zero-day vulnerability in Elastic’s Endpoint Detection and Response (EDR) software that transforms the security…

PoC Released for Fortinet FortiSIEM Command Injection Flaw
16
Aug
2025

PoC Released for Fortinet FortiSIEM Command Injection Flaw

Security researchers have uncovered a severe pre-authentication command injection vulnerability in Fortinet’s FortiSIEM platform that allows attackers to completely compromise…

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages
16
Aug
2025

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages

A sophisticated phishing campaign targeting the maintainer of eslint-config-prettier, a widely-used npm package with over 3.5 billion downloads, resulted in…

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks
16
Aug
2025

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks

Cisco Talos researchers have uncovered a sophisticated Chinese-speaking advanced persistent threat (APT) group, designated UAT-7237, that has been actively targeting…

Cisco IOS, IOS XE, and Secure Firewall Flaws Allow Remote DoS Attacks
15
Aug
2025

Cisco IOS, IOS XE, and Secure Firewall Flaws Allow Remote DoS Attacks

Cisco Systems has issued a high-priority security advisory addressing multiple critical vulnerabilities in the Internet Key Exchange Version 2 (IKEv2)…

F5 Fixes HTTP/2 Flaw Affecting Multiple Products in Massive DoS Attacks
15
Aug
2025

F5 Fixes HTTP/2 Flaw Affecting Multiple Products in Massive DoS Attacks

F5 Networks has disclosed a new HTTP/2 vulnerability affecting multiple BIG-IP products that could allow attackers to launch denial-of-service attacks…

ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
15
Aug
2025

ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows

The popular open-source image manipulation software ImageMagick has addressed four critical security vulnerabilities discovered by Google’s artificial intelligence-powered security research…

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash
15
Aug
2025

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash

Security researchers have uncovered a sophisticated new phishing campaign that exploits the Japanese hiragana character “ん” to create deceptively authentic-looking…

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password
15
Aug
2025

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password

A significant security breach has exposed the complete source code of ERMAC V3.0, a sophisticated banking trojan that targets over…