Category: GBHackers

Hackers Abuse AI Tool Misconfigurations to Execute Malicious AI-Generated Payloads
03
Jun
2025

Hackers Abuse AI Tool Misconfigurations to Execute Malicious AI-Generated Payloads

A malicious threat actor has exploited a misconfigured instance of Open WebUI, a widely-used self-hosted AI interface with over 95,000…

New Research Uncovers Strengths and Vulnerabilities in Cloud-Based LLM Guardrails
03
Jun
2025

New Research Uncovers Strengths and Vulnerabilities in Cloud-Based LLM Guardrails

Cybersecurity researchers have shed light on the intricate balance of strengths and vulnerabilities inherent in cloud-based Large Language Model (LLM)…

03
Jun
2025

Splunk Enterprise XSS Flaw Enables Attackers to Execute Unauthorized JavaScript

Splunk has disclosed a reflected Cross-Site Scripting (XSS) vulnerability in its Enterprise and Cloud Platform products, tracked as CVE-2025-20297 and…

Malicious NPM Packages Exploit Ethereum Wallets with Obfuscated JavaScript
03
Jun
2025

Malicious NPM Packages Exploit Ethereum Wallets with Obfuscated JavaScript

A recent wave of malicious NPM packages has emerged as a significant threat to cryptocurrency users, specifically targeting Ethereum wallet…

Threat Actors Target PerimeterX CAPTCHA to Automate Microsoft Account Creation
03
Jun
2025

Threat Actors Target PerimeterX CAPTCHA to Automate Microsoft Account Creation

A recent post on an underground forum has brought renewed attention to the escalating arms race between cybercriminals and anti-bot…

SolarWinds Dameware Vulnerability Could Let Attackers Gain Elevated Privileges
03
Jun
2025

SolarWinds Dameware Vulnerability Could Let Attackers Gain Elevated Privileges

June 3, 2025 – SolarWinds Worldwide, LLC has announced the release of Dameware 12.3.2, a critical service update focused on…

Critical HPE StoreOnce Flaws Allow Remote Code Execution by Attackers
03
Jun
2025

Critical HPE StoreOnce Flaws Allow Remote Code Execution by Attackers

Hewlett-Packard Enterprise (HPE) has issued a critical security bulletin (HPESBST04847 rev. 1) warning users of multiple high-impact vulnerabilities in its…

Threat Actors Leverage ClickFix Technique to Deploy EddieStealer Malware
02
Jun
2025

Threat Actors Leverage ClickFix Technique to Deploy EddieStealer Malware

Cybersecurity researchers have identified a sophisticated malware campaign utilizing deceptive CAPTCHA interfaces to distribute EddieStealer, a Rust-based information stealing malware…

Stealth Syscall Technique Allows Hackers to Evade Event Tracing and EDR Detection
02
Jun
2025

Stealth Syscall Technique Allows Hackers to Evade Event Tracing and EDR Detection

Advanced threat actors have developed sophisticated stealth syscall execution techniques that successfully bypass modern security infrastructure, including Event Tracing for…

Over 50,000 Azure AD Users' Access Tokens Exposed via Unauthenticated API Endpoint
02
Jun
2025

Over 50,000 Azure AD Users’ Access Tokens Exposed via Unauthenticated API Endpoint

CloudSEK’s BeVigil platform has uncovered a critical security vulnerability affecting an aviation giant, where an exposed JavaScript file containing an…

Hackers Weaponize Free SSH Client PuTTY to Deliver Malware on Windows
02
Jun
2025

Hackers Weaponize Free SSH Client PuTTY to Deliver Malware on Windows

OpenSSH has become a standard tool for secure remote management on both Linux and Windows systems. Since its inclusion as…

New PyPI Supply Chain Attacks Target Python and NPM Users on Windows and Linux
02
Jun
2025

New PyPI Supply Chain Attacks Target Python and NPM Users on Windows and Linux

Checkmarx Zero researcher Ariel Harush has uncovered a sophisticated malicious package campaign targeting Python and NPM users across Windows and…