Category: GBHackers

Over 2,000 Devices Compromised by Weaponized Social Security Statement Phishing Attacks
24
Jun
2025

Over 2,000 Devices Compromised by Weaponized Social Security Statement Phishing Attacks

CyberArmor analysts have uncovered a meticulously crafted phishing campaign that has already compromised over 2,000 devices by exploiting the trusted…

Weaponized DMV-Themed Phishing Scam Targets U.S. Citizens to Steal Personal and Financial Data
24
Jun
2025

Weaponized DMV-Themed Phishing Scam Targets U.S. Citizens to Steal Personal and Financial Data

A highly coordinated phishing campaign impersonating various U.S. state Departments of Motor Vehicles (DMVs) has emerged as a significant threat,…

Zimbra Classic Web Client Vulnerability Allows Arbitrary JavaScript Execution
24
Jun
2025

Zimbra Classic Web Client Vulnerability Allows Arbitrary JavaScript Execution

A critical security flaw has been discovered and patched in the Zimbra Collaboration Suite (ZCS) Classic Web Client, exposing millions…

NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols
24
Jun
2025

NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols

The National Cyber Security Centre (NCSC) has issued a critical alert regarding a newly identified malware, dubbed SHOE RACK, which…

Critical Convoy Flaw Allows Remote Code Execution on Servers
24
Jun
2025

Critical Convoy Flaw Allows Remote Code Execution on Servers

Credential Abuse Unmasked Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our…

OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot
24
Jun
2025

OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot

A newly disclosed security vulnerability in OPPO’s widely used Clone Phone app has raised significant concerns over user privacy, as…

North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks
24
Jun
2025

North Korean Hackers Use Malicious Zoom Apps to Execute System-Takeover Attacks

Cybersecurity researchers and targeted individuals have reported a highly sophisticated scam orchestrated by suspected North Korean hackers. This attack, disguised…

LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks
24
Jun
2025

LapDogs Hackers Compromise 1,000 SOHO Devices Using Custom Backdoor for Stealthy Attacks

Security researchers at SecurityScorecard have uncovered a sprawling cyber-espionage campaign orchestrated by the LapDogs Operational Relay Box (ORB) Network, a…

Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers
24
Jun
2025

Advanced Malware Campaign Targets WordPress and WooCommerce Sites with Hidden Skimmers

The Wordfence Threat Intelligence Team uncovered a sophisticated malware campaign during a routine site cleanup, revealing a family of malicious…

OWASP Launches AI Testing Guide to Uncover Vulnerabilities in AI Systems
24
Jun
2025

OWASP Launches AI Testing Guide to Uncover Vulnerabilities in AI Systems

As artificial intelligence (AI) becomes a cornerstone of modern industry, the Open Web Application Security Project (OWASP) has announced the…

Aviatrix Cloud Controller Flaw Enables Remote Code Execution via Authentication Bypass
24
Jun
2025

Aviatrix Cloud Controller Flaw Enables Remote Code Execution via Authentication Bypass

A Mandiant Red Team engagement has uncovered two critical vulnerabilities in Aviatrix Controller—cloud networking software used to manage multi-cloud environments….

WinRAR Vulnerability Exploited with Malicious Archives to Execute Code
24
Jun
2025

WinRAR Vulnerability Exploited with Malicious Archives to Execute Code

A newly disclosed vulnerability in RARLAB’s WinRAR, the widely used file compression utility for Windows, has put millions of users…