Category: GBHackers

Sophisticated Linux Rootkit That Persist Even After Reboots
20
Jan
2025

Sophisticated Linux Rootkit That Persist Even After Reboots

Pumakit is a sophisticated rootkit that leverages system call interception to manipulate file and network activity. It ensures persistence through…

Massive NBI Data Breach Exposes Millions of Users Records Online
20
Jan
2025

Massive NBI Data Breach Exposes Millions of Users Records Online

The National Bureau of Investigation (NBI), the Philippines’ top investigative agency, has reportedly been compromised, exposing the sensitive data of…

Rhino Linux 2025.1 Released - Update Now!
20
Jan
2025

Rhino Linux 2025.1 Released – Update Now!

Rhino Linux is roaring into the new year with the exciting release of Rhino Linux 2025.1! After a brief pause to…

Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop
20
Jan
2025

Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop

Cybersecurity researchers have uncovered a major flaw in the Windows BitLocker encryption system, allowing attackers to access encrypted data without…

PoC Exploit Released for QNAP RCE Vulnerability
20
Jan
2025

PoC Exploit Released for QNAP RCE Vulnerability

A critical remote code execution (RCE) vulnerability, tracked as CVE-2024-53691, has recently come to light, affecting users of QNAP’s QTS…

Multiple HPE Aruba Network Vulnerabilities Allows Remote Arbitrary Code Execution
20
Jan
2025

Multiple HPE Aruba Network Vulnerabilities Allows Remote Arbitrary Code Execution

 Hewlett Packard Enterprise (HPE) has confirmed multiple vulnerabilities in its Aruba Networking products that could allow remote arbitrary code execution….

Hackers Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol
18
Jan
2025

Hackers Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured on-premises applications can bypass Group Policy…

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
17
Jan
2025

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions of its native clients for…

New Tool Unveiled to Scan Hacking Content on Telegram
17
Jan
2025

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI module designed to monitor and…

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages
17
Jan
2025

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing campaigns are delivered via Telegram…

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability
17
Jan
2025

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability

A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables remote unauthenticated attackers to execute…

$40,000 Reward for Escalating Limited Path Traversal to RCE
17
Jan
2025

$40,000 Reward for Escalating Limited Path Traversal to RCE

As a dedicated bug bounty hunter with an enviable track record on BugCrowd, Abdullah Nawaf, Full full-time bug Bounty Hunter, thrives…