Category: GBHackers

Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks
11
Aug
2025

Linux Webcams Weaponized to Inject Keystrokes and Execute Attacks

Security researchers have uncovered a concerning vulnerability that transforms everyday USB webcams into covert attack tools capable of injecting malicious…

Silent Watcher Targets Windows Systems, Steals Data via Discord Webhooks
11
Aug
2025

Silent Watcher Targets Windows Systems, Steals Data via Discord Webhooks

K7 Labs investigated the Cmimai Stealer, a Visual Basic Script (VBS)-based infostealer that surfaced in June 2025 and uses PowerShell…

Smart Bus System Flaw Allows Hackers to Remotely Track and Control Vehicles
11
Aug
2025

Smart Bus System Flaw Allows Hackers to Remotely Track and Control Vehicles

A critical security vulnerability in smart bus systems has been discovered that enables hackers to remotely track vehicle locations and…

CastleLoader Malware Hits 400+ Devices via Cloudflare-Themed ClickFix Phishing Attack
11
Aug
2025

CastleLoader Malware Hits 400+ Devices via Cloudflare-Themed ClickFix Phishing Attack

CastleLoader, a sophisticated malware loader, has compromised over 400 devices since its debut in early 2025, with cybersecurity firm PRODAFT…

Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups
11
Aug
2025

Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups

Security researcher Ionuț Cernica revealed how commonplace Linux utilities can be weaponized to siphon sensitive data in multi-tenant environments. His…

Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope
11
Aug
2025

Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope

Security researchers at AmberWolf have uncovered critical vulnerabilities in leading Zero Trust Network Access (ZTNA) solutions from major cybersecurity vendors,…

Malware Campaign Masquerades as Tesla in Poisoned Google Ads
11
Aug
2025

Malware Campaign Masquerades as Tesla in Poisoned Google Ads

A malware operation has surfaced in the context of a complex cyber threat landscape, using tainted Google Ads to pose…

Windows RPC Protocol Exploited to Launch Server Spoofing Attacks
11
Aug
2025

Windows RPC Protocol Exploited to Launch Server Spoofing Attacks

A vulnerability in Microsoft Windows’ Remote Procedure Call (RPC) protocol has been discovered that allows attackers to manipulate core system…

Linux Kernel Vulnerability Allows Attackers to Gain Full Kernel-Level Control From Chrome Sandbox
09
Aug
2025

Linux Kernel Vulnerability Allows Attackers to Gain Full Kernel-Level Control From Chrome Sandbox

August 9, 2025: A severe security vulnerability in the Linux kernel, dubbed CVE-2025-38236, has been uncovered by Google Project Zero…

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data
09
Aug
2025

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data

Microsoft security researchers have uncovered four critical vulnerabilities in Windows BitLocker that could allow attackers with physical access to bypass…

Over 28,000 Microsoft Exchange Servers Exposed Online to CVE-2025-53786 Vulnerability
09
Aug
2025

Over 28,000 Microsoft Exchange Servers Exposed Online to CVE-2025-53786 Vulnerability

The cybersecurity community faces a significant threat as scanning data reveals over 28,000 unpatched Microsoft Exchange servers remain exposed on…

A Cobalt Strike Like Tool That Turns Chrome into C2 Platform
09
Aug
2025

A Cobalt Strike Like Tool That Turns Chrome into C2 Platform

At DEF CON 33, security researcher Mike Weber of Praetorian Security unveiled ChromeAlone — a Chromium-based browser Command & Control…