Category: GBHackers

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers
08
May
2025

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and macOS systems to local privilege…

Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution by Attackers
08
May
2025

Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of 10.0-could allow attackers to hijack…

Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters
08
May
2025

Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters

Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that enable attackers to bypass security…

Scamming the Scammers in Telegram's PigButchering Scheme
08
May
2025

Scamming the Scammers in Telegram’s PigButchering Scheme

Cybersecurity specialists have devised an innovative approach to combat an emerging cybercrime called “PigButchering” on the Telegram platform. This form…

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations
08
May
2025

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco Talos, active since at least January…

Russian COLDRIVER Hackers Deploy LOSTKEYS Malware to Steal Sensitive Information
08
May
2025

Russian COLDRIVER Hackers Deploy LOSTKEYS Malware to Steal Sensitive Information

The Google Threat Intelligence Group (GTIG) has uncovered a sophisticated new malware dubbed LOSTKEYS, attributed to the Russian government-backed threat…

Microsoft Bookings Vulnerability Allows Unauthorized Changes to Meeting Details
08
May
2025

Microsoft Bookings Vulnerability Allows Unauthorized Changes to Meeting Details

Security researchers have uncovered a significant vulnerability in Microsoft Bookings, the scheduling tool integrated with Microsoft 365. The flaw, discovered…

Cisco IOS, XE, and XR Vulnerability Allows Remote Device Reboots
08
May
2025

Cisco IOS, XE, and XR Vulnerability Allows Remote Device Reboots

 Cisco has issued an urgent security advisory (cisco-sa-twamp-kV4FHugn) warning of a critical vulnerability in its widely used IOS, IOS XE,…

Free Cyber Threat Intelligence Platform for Security Experts
08
May
2025

Free Cyber Threat Intelligence Platform for Security Experts

OpenCTI (Open Cyber Threat Intelligence) stands out as a free, open source platform specifically designed to address this need-delivering robust…

Internal Chats and Data Leaked Online
08
May
2025

Internal Chats and Data Leaked Online

The notorious LockBit ransomware group, once considered one of the world’s most prolific cyber extortion rings, has itself become the…

Cisco IOS XE Wireless Controllers Vulnerability Lets Attackers Seize Full Control
08
May
2025

Cisco IOS XE Wireless Controllers Vulnerability Lets Attackers Seize Full Control

A critical security flaw has been discovered in Cisco IOS XE Wireless LAN Controllers (WLCs), potentially allowing unauthenticated remote attackers…

Russian Company Gains Full Control Over Critical Open Source Easyjson Library
07
May
2025

Russian Company Gains Full Control Over Critical Open Source Easyjson Library

A startling discovery by Hunted Labs has brought to light a potential security risk lurking within the heart of the…