Category: GBHackers

11
Apr
2025

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has been uncovered in select Calix networking…

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution
11
Apr
2025

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to bypass microcode signature verification and execute…

Researchers Exploit Windows Defender with XOR and System Calls
11
Apr
2025

Researchers Exploit Windows Defender with XOR and System Calls

A recent cybersecurity revelation has demonstrated how researchers successfully bypassed Windows Defender antivirus mechanisms using advanced techniques involving XOR encryption…

Ivanti 0-Day RCE Flaw Exploitation Details Revealed
11
Apr
2025

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across the cybersecurity industry. The flaw, which…

Microsoft Issues Urgent Patch to Fix Office Update Crash
11
Apr
2025

Microsoft Issues Urgent Patch to Fix Office Update Crash

Microsoft has released an urgent patch for Office 2016 to address a critical issue causing key applications like Word, Excel,…

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic
11
Apr
2025

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic

A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network security. The vulnerability, stemming from the…

Malicious ‘mParivahan’ App Circulates on WhatsApp, Skimming Sensitive Mobile Data
11
Apr
2025

Malicious ‘mParivahan’ App Circulates on WhatsApp, Skimming Sensitive Mobile Data

A new variant of the fake NextGen mParivahan app has emerged, exploiting the trust users place in official government notifications…

Google Introduces A2A Protocol, Empowering AI Agents to Team Up and Automate Workflows
11
Apr
2025

Google Introduces A2A Protocol, Empowering AI Agents to Team Up and Automate Workflows

Google Cloud announced the launch of a pioneering open protocol named Agent2Agent (A2A), aiming to revolutionize how AI agents interact…

RansomHub RaaS in Disarray After Affiliate Chat Access Suddenly Revoked
10
Apr
2025

RansomHub RaaS in Disarray After Affiliate Chat Access Suddenly Revoked

RansomHub, a leading Ransomware-as-a-Service (RaaS) group that emerged in early 2024, has found itself grappling with internal turmoil. The instability…

A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear
10
Apr
2025

A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear

A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat to global network infrastructure due to…

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks
10
Apr
2025

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against critical sectors within the Russian Federation,…

The State of AI Malware and Defenses Against It
10
Apr
2025

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders awake. The increasing popularity of and…