Category: GBHackers

Apache CloudStack Flaw Allows Attackers to Execute Privileged Actions
11
Jun
2025

Apache CloudStack Flaw Allows Attackers to Execute Privileged Actions

Apache CloudStack, a leading open-source cloud management platform, has announced the immediate availability of new Long-Term Support (LTS) releases—version 4.19.3.0…

HPE Aruba Network Flaw Exposes Sensitive Data to Potential Hackers
11
Jun
2025

HPE Aruba Network Flaw Exposes Sensitive Data to Potential Hackers

HPE Aruba Networking has issued a critical security advisory regarding a high-severity vulnerability in its Private 5G Core Platform. Tracked…

Multiple Chrome Flaws Enable Remote Code Execution by Attackers
11
Jun
2025

Multiple Chrome Flaws Enable Remote Code Execution by Attackers

Google Chrome’s Stable channel is being updated to version 137.0.7151.103 for Windows and Mac, with Linux receiving version 137.0.7151.103 as…

Insyde UEFI Flaw Enables Digital Certificate Injection via NVRAM Variable
11
Jun
2025

Insyde UEFI Flaw Enables Digital Certificate Injection via NVRAM Variable

A critical vulnerability (CVE-2025-4275) in Insyde H2O UEFI firmware allows attackers to bypass Secure Boot protections by injecting malicious digital…

Beware of Instagram Growth Tools Stealing Login Credentials and Sending Them to Attackers
11
Jun
2025

Beware of Instagram Growth Tools Stealing Login Credentials and Sending Them to Attackers

A discovery by Socket’s Threat Research Team has unveiled a malicious Python package named imad213, masquerading as an Instagram growth…

New Report Highlights the Internet as the Primary Threat to Industrial Automation Systems
10
Jun
2025

New Report Highlights the Internet as the Primary Threat to Industrial Automation Systems

A recent report by Kaspersky ICS CERT, released on June 10, 2025, sheds light on the persistent and evolving cyberthreats…

Microsoft Windows WebDAV 0-Day RCE Vulnerability Actively Exploited in The Wild
10
Jun
2025

Microsoft Windows WebDAV 0-Day RCE Vulnerability Actively Exploited in The Wild

A critical zero-day vulnerability in Microsoft Windows, designated CVE-2025-33053, has been actively exploited by the advanced persistent threat (APT) group…

Microsoft Patch Tuesday June 2025 – 66 Vulnerabilities Patched Including 2 Zero-Day
10
Jun
2025

Microsoft Patch Tuesday June 2025 – 66 Vulnerabilities Patched Including 2 Zero-Day

Microsoft has released its June 2025 Patch Tuesday security updates, addressing a total of 66 vulnerabilities across its software ecosystem….

ESET Details on How to Manage Your Digital Footprint
10
Jun
2025

ESET Details on How to Manage Your Digital Footprint

ESET, a leading cybersecurity firm, has shed light on the intricate nature of digital footprints the data trails left by…

SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges
10
Jun
2025

SAP NetWeaver Vulnerability Allows Attackers to Escalate Privileges

A critical vulnerability in the SAP NetWeaver Application Server AS ABAP has been disclosed under SAP Security Note #3600840, carrying…

North Korean APT Hackers Target Users on Social Media to Spread Malware
10
Jun
2025

North Korean APT Hackers Target Users on Social Media to Spread Malware

The Genians Security Center (GSC) has uncovered a highly sophisticated Advanced Persistent Threat (APT) campaign orchestrated by the North Korean…

ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection Exploit
10
Jun
2025

ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection Exploit

A critical security vulnerability has been identified in ISPConfig version 3.2.12p1, a widely used open-source web hosting control panel. The…