Category: GBHackers

FUJIFILM Printer Flaw Allows Attackers to Trigger DoS Attacks
04
Aug
2025

FUJIFILM Printer Flaw Allows Attackers to Trigger DoS Attacks

FUJIFILM Business Innovation has disclosed a critical vulnerability affecting multiple printer models that could allow attackers to launch denial-of-service (DoS)…

Hackers Leverage AI to Craft Malicious NPM Package That Drains Crypto Wallets
04
Aug
2025

Hackers Leverage AI to Craft Malicious NPM Package That Drains Crypto Wallets

Security researchers at Safety have uncovered an AI-generated malicious NPM package dubbed @kodane/patch-manager, engineered as an advanced cryptocurrency wallet drainer….

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Allegedly Leaked Online
04
Aug
2025

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Allegedly Leaked Online

Digital Rights Management (DRM) systems are essential for safeguarding premium streaming content against unauthorized access and piracy, with Microsoft’s PlayReady…

ShadowSyndicate infrastructure Used by Multiple ransomware Groups Including Cl0p, LockBit and RansomHub
04
Aug
2025

ShadowSyndicate infrastructure Used by Multiple ransomware Groups Including Cl0p, LockBit and RansomHub

Cybersecurity researchers have uncovered significant overlaps between the attack infrastructure of ShadowSyndicate, also known as Infra Storm by Group-IB, and…

North Korea Hiding Malware Within JPEG Files to Attack Windows Systems Bypassing Detections
04
Aug
2025

North Korea Hiding Malware Within JPEG Files to Attack Windows Systems Bypassing Detections

Security researchers at Genians Security Center have uncovered a sophisticated new variant of the RoKRAT malware, attributed to the North…

Vulnerabilities in Government-Linked Partner Software Allow Remote Code Attacks
04
Aug
2025

Vulnerabilities in Government-Linked Partner Software Allow Remote Code Attacks

Multiple serious security vulnerabilities have been discovered in Partner Software and Partner Web applications widely used by government agencies and…

NestJS Vulnerability Allows Code Execution on Developer Machines
04
Aug
2025

NestJS Vulnerability Allows Code Execution on Developer Machines

A critical remote code execution vulnerability has been discovered in the popular NestJS framework that could allow attackers to execute…

Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine
04
Aug
2025

Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine

HashiCorp has disclosed a critical security vulnerability affecting its Vault products that could allow privileged operators to execute arbitrary code…

Critical Squid Flaw Allows Remote Code Execution by Attackers
04
Aug
2025

Critical Squid Flaw Allows Remote Code Execution by Attackers

A severe security vulnerability in the widely-used Squid HTTP proxy has been disclosed, potentially exposing millions of systems to remote…

AI-Powered Cursor IDE Exposes Users to Silent Remote Code Execution
04
Aug
2025

AI-Powered Cursor IDE Exposes Users to Silent Remote Code Execution

Cybersecurity researchers at Aim Labs have discovered a critical vulnerability in the popular AI-powered Cursor IDE that enables attackers to…

Pi-hole Plugin Flaw Exposes Donor Names and Email Addresses in Data Breach
03
Aug
2025

Pi-hole Plugin Flaw Exposes Donor Names and Email Addresses in Data Breach

A Pi-hole donor has reported receiving spam email to an address created exclusively for their donation to the popular network-level…

Qilin Ransomware Affiliate Panel Login Credentials Exposed Online
02
Aug
2025

Qilin Ransomware Affiliate Panel Login Credentials Exposed Online

A significant security breach within the Qilin ransomware operation has provided unprecedented insight into the group’s affiliate network structure and…