Category: GBHackers

Command-Line Editor Vim Hit by Vulnerability Allowing File Overwrites
16
Jul
2025

Command-Line Editor Vim Hit by Vulnerability Allowing File Overwrites

A critical security vulnerability has been discovered in Vim, the popular open-source command-line text editor, that could allow attackers to…

Authorities Take Down ‘Diskstation’ Ransomware Gang Targeting Synology NAS Globally
16
Jul
2025

Authorities Take Down ‘Diskstation’ Ransomware Gang Targeting Synology NAS Globally

Italian State Police, working alongside French and Romanian authorities, have successfully dismantled a sophisticated ransomware operation known as “Diskstation” that…

Google Chrome 0-Day Vulnerability Under Active Exploitation
16
Jul
2025

Google Chrome 0-Day Vulnerability Under Active Exploitation

Google has released an emergency security update for Chrome 138 to address a critical zero-day vulnerability that is actively being…

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case
16
Jul
2025

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case

A 21-year-old former U.S. Army soldier has pleaded guilty to participating in a sophisticated cybercrime operation that targeted telecommunications companies…

VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution
16
Jul
2025

VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution

Broadcom disclosed four critical vulnerabilities in VMware’s virtualization suite on July 15, 2025, enabling attackers to escape virtual machines and…

Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS
16
Jul
2025

Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS

The Node.js project has released critical security updates across multiple release lines to address two high-severity vulnerabilities that pose significant…

North Korean Hackers Exploit 67 Malicious npm Packages to Spread XORIndex Malware
15
Jul
2025

North Korean Hackers Exploit 67 Malicious npm Packages to Spread XORIndex Malware

The Socket Threat Research Team has discovered a new software supply chain attack that uses a malware loader called XORIndex…

GLOBAL GROUP RaaS Adds AI-Powered Negotiation Feature for Ransom Demands
15
Jul
2025

GLOBAL GROUP RaaS Adds AI-Powered Negotiation Feature for Ransom Demands

A newly surfaced Ransomware-as-a-Service operation, dubbed GLOBAL GROUP, has begun deploying an AI‐driven negotiation tool that elevates the psychological pressure…

Kafbat UI Vulnerabilities Allow Arbitrary Code Execution via JMX Services
15
Jul
2025

Kafbat UI Vulnerabilities Allow Arbitrary Code Execution via JMX Services

A critical security vulnerability has been discovered in Kafbat UI, a popular web-based interface for managing Apache Kafka clusters, allowing…

Iranian Threat Actors Target U.S. Critical Infrastructure, Including Water Systems
15
Jul
2025

Iranian Threat Actors Target U.S. Critical Infrastructure, Including Water Systems

Iran’s Islamic Revolutionary Guard Corps (IRGC) has increased its asymmetric cyber operations in response to recent U.S. attacks on Iranian…

Ransomware Attack on Albemarle County Exposes Residents’ Personal Information
15
Jul
2025

Ransomware Attack on Albemarle County Exposes Residents’ Personal Information

Albemarle County, Virginia, discovered irregularities in its IT infrastructure under a sophisticated ransomware attack. The breach was quickly recognized by…

Microsoft Explains How Security Copilot in Intune and Entra Supports Security and IT Teams
15
Jul
2025

Microsoft Explains How Security Copilot in Intune and Entra Supports Security and IT Teams

Microsoft has detailed how its Security Copilot, an AI-powered tool, is transforming security and IT operations by embedding generative AI…