Category: GBHackers

Android Security Update Addresses High-Severity Privilege Escalation Flaws
03
Jun
2025

Android Security Update Addresses High-Severity Privilege Escalation Flaws

The Android Security Bulletin for June 2025, published on June 2, details a series of high-severity vulnerabilities affecting a wide…

State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems
03
Jun
2025

State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems

The manufacturing sector has emerged as a prime target for cyber attackers in 2024, with a staggering 71% surge in…

Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis
03
Jun
2025

Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis

Cybersecurity researchers have shed light on the often-underestimated vulnerabilities in containerized environments, emphasizing the critical role of host-based log analysis…

New Linux PumaBot Targets IoT Devices with SSH Credential Brute-Force Attack
03
Jun
2025

New Linux PumaBot Targets IoT Devices with SSH Credential Brute-Force Attack

A new and insidious threat has surfaced in the cybersecurity landscape as Darktrace’s Threat Research team uncovers PumaBot, a Go-based…

Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data
03
Jun
2025

Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data

A pro-Ukrainian hacktivist group known as BO Team, also operating under aliases such as Black Owl, Lifting Zmiy, and Hoody…

Top Russian Dark Web Market Tools Drive Surge in Credential Theft Attacks
03
Jun
2025

Top Russian Dark Web Market Tools Drive Surge in Credential Theft Attacks

In a chilling revelation for cybersecurity professionals, the Russian Market has solidified its position as the leading hub for stolen…

Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities
03
Jun
2025

Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities

Aembit, the workload identity and access management (IAM) company, today announced a major expansion of its platform to support Microsoft…

Apple iOS Activation Flaw Enables Injection of Unauthenticated XML Payloads
03
Jun
2025

Apple iOS Activation Flaw Enables Injection of Unauthenticated XML Payloads

A severe vulnerability in Apple’s iOS activation infrastructure has been uncovered, posing a significant risk to device security during the…

New Safari XSS Vulnerability Exploits JavaScript Error Handling to Run Arbitrary Code
03
Jun
2025

New Safari XSS Vulnerability Exploits JavaScript Error Handling to Run Arbitrary Code

Cross-site scripting (XSS) remains one of the most persistent threats in web security, but most discussions focus on traditional vectors….

Hackers Abuse AI Tool Misconfigurations to Execute Malicious AI-Generated Payloads
03
Jun
2025

Hackers Abuse AI Tool Misconfigurations to Execute Malicious AI-Generated Payloads

A malicious threat actor has exploited a misconfigured instance of Open WebUI, a widely-used self-hosted AI interface with over 95,000…

New Research Uncovers Strengths and Vulnerabilities in Cloud-Based LLM Guardrails
03
Jun
2025

New Research Uncovers Strengths and Vulnerabilities in Cloud-Based LLM Guardrails

Cybersecurity researchers have shed light on the intricate balance of strengths and vulnerabilities inherent in cloud-based Large Language Model (LLM)…

03
Jun
2025

Splunk Enterprise XSS Flaw Enables Attackers to Execute Unauthorized JavaScript

Splunk has disclosed a reflected Cross-Site Scripting (XSS) vulnerability in its Enterprise and Cloud Platform products, tracked as CVE-2025-20297 and…