Category: GBHackers

Critical Kibana Flaws Enable Heap Corruption and Remote Code Execution
25
Jun
2025

Critical Kibana Flaws Enable Heap Corruption and Remote Code Execution

A critical security flaw has been uncovered in Kibana, the popular data visualization platform for the Elastic Stack, exposing organizations…

TeamViewer for Windows Vulnerability Lets Hackers Delete Files with SYSTEM Rights
25
Jun
2025

TeamViewer for Windows Vulnerability Lets Hackers Delete Files with SYSTEM Rights

A critical security vulnerability has been discovered in TeamViewer Remote Management for Windows, exposing systems to potential privilege escalation attacks….

CISA Releases New ICS Advisories Highlighting Ongoing Threats and Exploits
25
Jun
2025

CISA Releases New ICS Advisories Highlighting Ongoing Threats and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released eight new Industrial Control Systems (ICS) advisories on June 24, 2025,…

NVIDIA Megatron LM Flaw Allows Attackers to Inject Malicious Code
25
Jun
2025

NVIDIA Megatron LM Flaw Allows Attackers to Inject Malicious Code

NVIDIA has issued an urgent security update for its open-source Megatron-LM framework, following the discovery of two critical vulnerabilities that…

New FileFix Exploit Uses Windows File Explorer to Run Malicious Commands
25
Jun
2025

New FileFix Exploit Uses Windows File Explorer to Run Malicious Commands

A newly discovered exploit, dubbed “FileFix,” is raising alarms in the cybersecurity community for its innovative use of Windows File…

EagleSpy v5 RAT Promoted by Hacker for Stealthy Android Access
24
Jun
2025

EagleSpy v5 RAT Promoted by Hacker for Stealthy Android Access

A notorious threat actor known as “xperttechy” is actively promoting a new version of the EagleSpy remote access Trojan (RAT),…

America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers
24
Jun
2025

America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers

Jérôme Segura, cybercriminals are exploiting search parameter vulnerabilities to inject fake phone numbers into the legitimate websites of major brands…

New DRAT V2 Update Enhances C2 Protocol with Shell Command Execution Capabilities
24
Jun
2025

New DRAT V2 Update Enhances C2 Protocol with Shell Command Execution Capabilities

A new variant of the DRAT remote access trojan (RAT), dubbed DRAT V2, has been uncovered as part of a…

Threat Actors Exploit ConnectWise Configuration to Create Signed Malware
24
Jun
2025

Threat Actors Exploit ConnectWise Configuration to Create Signed Malware

Threat actors have increasingly exploited vulnerabilities and configurations in ConnectWise software to distribute signed malware, masquerading as legitimate applications. Initially…

Gonjeshke Darande Hackers Pose as Activists to Infiltrate Iranian Crypto Exchange
24
Jun
2025

Gonjeshke Darande Hackers Pose as Activists to Infiltrate Iranian Crypto Exchange

Gonjeshke Darande, a cyber threat actor widely suspected to be an Israeli state-sponsored group masquerading as an Iranian opposition hacktivist…

Over 2,000 Devices Compromised by Weaponized Social Security Statement Phishing Attacks
24
Jun
2025

Over 2,000 Devices Compromised by Weaponized Social Security Statement Phishing Attacks

CyberArmor analysts have uncovered a meticulously crafted phishing campaign that has already compromised over 2,000 devices by exploiting the trusted…

Weaponized DMV-Themed Phishing Scam Targets U.S. Citizens to Steal Personal and Financial Data
24
Jun
2025

Weaponized DMV-Themed Phishing Scam Targets U.S. Citizens to Steal Personal and Financial Data

A highly coordinated phishing campaign impersonating various U.S. state Departments of Motor Vehicles (DMVs) has emerged as a significant threat,…