Category: GBHackers

Apache InLong JDBC Vulnerability Enables Deserialization of Untrusted Data
30
May
2025

Apache InLong JDBC Vulnerability Enables Deserialization of Untrusted Data

A moderate-severity vulnerability, tracked as CVE-2025-27522, has been disclosed in Apache InLong, a popular data integration platform. The flaw, affecting…

Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks
30
May
2025

Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks

In a two UK-based universities have fallen victim to a sophisticated Remote Access Trojan (RAT) dubbed NodeSnake within the past…

PureHVNC RAT Uses Fake Job Offers and PowerShell to Evade Security Defenses
30
May
2025

PureHVNC RAT Uses Fake Job Offers and PowerShell to Evade Security Defenses

A new and highly evasive malware campaign delivering the PureHVNC Remote Access Trojan (RAT) has been identified by Netskope Threat…

Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack
29
May
2025

Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack

Threat actors have orchestrated a multi-wave phishing campaign between April and May 2025, leveraging the legitimate infrastructure of Nifty[.]com, a…

Windows 11 File Explorer Vulnerability Enables NTLM Hash Theft
29
May
2025

Windows 11 File Explorer Vulnerability Enables NTLM Hash Theft

A newly disclosed vulnerability, CVE-2025-24071, has been identified in Windows File Explorer, specifically affecting Windows 11 (23H2) and earlier versions…

New Microsoft Entra Connect Update Replaces Legacy Login Methods
29
May
2025

New Microsoft Entra Connect Update Replaces Legacy Login Methods

Quantum computing is rapidly emerging as one of the most transformative technology trends of 2025, promising to revolutionize industries by…

Critical Dell PowerStore T Vulnerability Allows Full System Compromise
29
May
2025

Critical Dell PowerStore T Vulnerability Allows Full System Compromise

As part of its ongoing commitment to product security, Dell Technologies has released a significant update for the PowerStore T…

CISA Releases Dedicated SIEM & SOAR Guide for Cybersecurity Professionals
29
May
2025

CISA Releases Dedicated SIEM & SOAR Guide for Cybersecurity Professionals

Security Information and Event Management (SIEM) platforms are essential for detecting, analyzing, and responding to cybersecurity threats in real time….

UTG-Q-015 Hackers Launch Massive Brute-Force Attacks on Government Web Servers
29
May
2025

UTG-Q-015 Hackers Launch Massive Brute-Force Attacks on Government Web Servers

The hacker group UTG-Q-015, first identified in December 2024 for mounting attacks on major websites like CSDN, has escalated its…

Victoria’s Secret Website Taken Offline After Cybersecurity Breach
29
May
2025

Victoria’s Secret Website Taken Offline After Cybersecurity Breach

Victoria’s Secret, the iconic lingerie retailer, has taken its US website offline and suspended some in-store services following a major…

New Spear-Phishing Campaign Targets Financial Executives with NetBird Malware
29
May
2025

New Spear-Phishing Campaign Targets Financial Executives with NetBird Malware

Trellix’s email security systems detected a highly targeted spear-phishing campaign aimed at CFOs and finance executives across industries like banking,…

Red Teaming Tool Targets AI, Kubernetes, and API Vulnerabilities
29
May
2025

Red Teaming Tool Targets AI, Kubernetes, and API Vulnerabilities

Operant AI has announced the release of Woodpecker, an open-source automated red teaming engine designed to make advanced security testing…