Category: GBHackers

Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations
04
Jul
2025

Apache APISIX Vulnerability Enables Cross-Issuer Access Under Misconfigurations

A newly disclosed vulnerability, CVE-2025-46647, has been identified in the openid-connect plugin of Apache APISIX, a widely used open-source API gateway….

Malicious SEO Plugins on WordPress Can Lead to Site Takeover
04
Jul
2025

Malicious SEO Plugins on WordPress Can Lead to Site Takeover

A new wave of cyberattacks is targeting WordPress websites through malicious SEO plugins that can lead to complete site takeover….

Instagram Now Rotating TLS Certificates Daily with 1-Week Validity
04
Jul
2025

Instagram Now Rotating TLS Certificates Daily with 1-Week Validity

Instagram has begun rotating its TLS certificates on a daily basis, with each certificate valid for just over a week….

Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence
04
Jul
2025

Scattered Spider Enhances Tactics to Exploit Legitimate Tools for Evasion and Persistence

Scattered Spider, also tracked under aliases such as UNC3944, Scatter Swine, and Muddled Libra, has emerged as a formidable financially…

Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
04
Jul
2025

Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions

A security researcher has uncovered a significant vulnerability affecting Lenovo computers: a writable file within the Windows directory that can…

Critical HIKVISION applyCT Flaw Allows Remote Code Execution
04
Jul
2025

Critical HIKVISION applyCT Flaw Allows Remote Code Execution

A newly disclosed vulnerability, tracked as CVE-2025-34067, has been identified in HIKVISION’s widely deployed security management platform, applyCT (also known as…

Massive Android Ad Fraud 'IconAds' Uses Google Play to Target and Exploit Users
04
Jul
2025

Massive Android Ad Fraud ‘IconAds’ Uses Google Play to Target and Exploit Users

HUMAN’s Satori Threat Intelligence and Research Team has dismantled a sprawling ad fraud operation named IconAds, which infiltrated the Google…

Researchers Defeat Content Security Policy Protections via HTML Injection
04
Jul
2025

Researchers Defeat Content Security Policy Protections via HTML Injection

In a breakthrough that challenges the perceived safety of nonce-based Content Security Policy (CSP), security researchers have demonstrated a practical…

Catwatchful Android Spyware Leaks Credentials of 62,000+ Users
04
Jul
2025

Catwatchful Android Spyware Leaks Credentials of 62,000+ Users

A major security lapse has exposed the credentials of over 62,000 users of Catwatchful, a full-featured Android spyware app that…

Multiple PHP Vulnerabilities Enables SQLi and DoS Attacks – Update Now
04
Jul
2025

Multiple PHP Vulnerabilities Enables SQLi and DoS Attacks – Update Now

Security researchers have disclosed two significant vulnerabilities in PHP, the popular server-side scripting language, that could allow attackers to launch…

New "123 | Stealer" Malware Rented on Dark Web for $120/Month
04
Jul
2025

New “123 | Stealer” Malware Rented on Dark Web for $120/Month

A new credential-stealing malware, dubbed “123 | Stealer,” has surfaced on underground cybercrime forums, with the threat actor known as #koneko offering…

Let’s Encrypt Expands to Issue SSL/TLS Certificates for IP Addresses
03
Jul
2025

Let’s Encrypt Expands to Issue SSL/TLS Certificates for IP Addresses

Let’s Encrypt, a leading certificate authority (CA) known for providing free SSL/TLS certificates since 2015, has issued its first-ever certificate…