Category: GBHackers

Qilin Exploits SAP Zero-Day Vulnerability Weeks Ahead of Public Disclosure
20
May
2025

Qilin Exploits SAP Zero-Day Vulnerability Weeks Ahead of Public Disclosure

Cybersecurity experts at OP Innovate have uncovered evidence that CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver Visual Composer, was…

WordPress Plugin Flaw Puts 22,000 Websites at Risk of Cyber Attacks
20
May
2025

WordPress Plugin Flaw Puts 22,000 Websites at Risk of Cyber Attacks

A severe security flaw has been uncovered in the Motors WordPress theme, a popular choice for car dealerships and listings…

Critical Multer Vulnerability Puts Millions of Node.js Apps at Risk
20
May
2025

Critical Multer Vulnerability Puts Millions of Node.js Apps at Risk

Critical security vulnerability has been discovered in Multer, one of the most widely used Node.js middleware packages for handling file…

Microsoft Issues Urgent Patch to Resolve BitLocker Recovery Problem
20
May
2025

Microsoft Issues Urgent Patch to Resolve BitLocker Recovery Problem

Microsoft has released an emergency update to address a critical issue affecting Windows 10 devices with specific Intel processors. The…

O2 VoLTE Flaw Allows Tracking of Customers’ Locations Through Phone Calls
20
May
2025

O2 VoLTE Flaw Allows Tracking of Customers’ Locations Through Phone Calls

Significant privacy vulnerability in O2 UK’s Voice over LTE (VoLTE) implementation was recently discovered, allowing any caller to access precise…

Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features
20
May
2025

Tor Browser 14.5.2 Released: Bug Fixes and Enhanced Features

Tor Project has launched Tor Browser 14.5.2, a significant update addressing security vulnerabilities, refining cross-platform functionality, and enhancing build system…

Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code
20
May
2025

Critical pfSense Firewall Flaws Enable Attackers to Inject Malicious Code

Security researchers have uncovered three critical vulnerabilities in pfSense firewall software that could allow attackers to inject malicious code, corrupt…

CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog
20
May
2025

CISA Adds Actively Exploited Ivanti EPMM Zero-Day to KEV Catalog

Cybersecurity and Infrastructure Security Agency (CISA) has added two critical zero-day vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM) to its…

Investigating Cobalt Strike Beacons Using Shodan: A Researcher’s Guide
20
May
2025

Investigating Cobalt Strike Beacons Using Shodan: A Researcher’s Guide

Security researcher has revealed a robust method for gathering threat intelligence on Cobalt Strike beacons using Shodan and PowerShell, filling…

Cache Timing Techniques Used to Bypass Windows 11 KASLR and Reveal Kernel Base
20
May
2025

Cache Timing Techniques Used to Bypass Windows 11 KASLR and Reveal Kernel Base

Cache timing side-channel attacks have been used to circumvent Kernel Address Space Layout Randomization (KASLR) on fully updated Windows 11…

Chinese APT Hackers Target Organizations Using Korplug Loaders and Malicious USB Drives
20
May
2025

Chinese APT Hackers Target Organizations Using Korplug Loaders and Malicious USB Drives

Advanced persistent threat (APT) groups with ties to China have become persistent players in the cyber espionage landscape, with a…

New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials
20
May
2025

New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials

A newly identified phishing campaign is targeting unsuspecting users by masquerading as urgent Zoom meeting invitations from colleagues. This deceptive…