Category: GBHackers

7-Zip RCE Vulnerability Actively Exploited by Hackers
20
Nov
2025

7-Zip RCE Vulnerability Actively Exploited by Hackers

Cybersecurity researchers have reported active exploitation of a critical vulnerability in 7-Zip, the popular file compression software used by millions…

Ollama Flaws Let Hackers Run Any Code Using Malicious Model Files
20
Nov
2025

Ollama Flaws Let Hackers Run Any Code Using Malicious Model Files

Critical security vulnerabilities discovered in Ollama, one of GitHub’s most popular open-source projects with over 155,000 stars, could allow attackers…

Researchers Detail Rhadamanthys Loader’s Advanced Anti-Sandboxing and Anti-AV Emulation Techniques
20
Nov
2025

Researchers Detail Rhadamanthys Loader’s Advanced Anti-Sandboxing and Anti-AV Emulation Techniques

Rhadamanthys, a sophisticated information-stealing malware active since 2022, has drawn renewed attention from security researchers who recently published an in-depth…

NSA Issues New Guidance to Help ISPs and Defenders Stop Malicious Activity
20
Nov
2025

NSA Issues New Guidance to Help ISPs and Defenders Stop Malicious Activity

The National Security Agency (NSA), CISA, FBI, and international cybersecurity partners have released groundbreaking guidance to help internet service providers and network…

Chinese APT Group Exploits DLL Sideloading to Breach Government and Media Targets
20
Nov
2025

Chinese APT Group Exploits DLL Sideloading to Breach Government and Media Targets

A China-nexus advanced persistent threat (APT) group has been conducting a sustained espionage campaign targeting government and media sectors across…

Hackers Launch 2.3 Million Attacks on Palo Alto GlobalProtect VPN Portals
20
Nov
2025

Hackers Launch 2.3 Million Attacks on Palo Alto GlobalProtect VPN Portals

Security researchers at GreyNoise have uncovered a massive spike in cyberattacks targeting Palo Alto Networks GlobalProtect VPN systems. The assault…

The Rise of Hybrid Threat Actors: Digital Meets Physical
20
Nov
2025

The Rise of Hybrid Threat Actors: Digital Meets Physical

The distinction between cyber warfare and traditional military operations is disappearing. Recent investigations by Amazon threat intelligence teams have identified…

The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals
20
Nov
2025

The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals

Generative artificial intelligence has fundamentally transformed the landscape of cybercriminal operations by eliminating what was once a critical barrier to…

Critical Twonky Server Flaws Let Hackers Bypass Login Protection
20
Nov
2025

Critical Twonky Server Flaws Let Hackers Bypass Login Protection

Twonky Server version 8.5.2 contains two critical authentication bypass vulnerabilities that allow unauthenticated attackers to steal administrator credentials and take…

CredShields Partners with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs
20
Nov
2025

CredShields Partners with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs

Singapore, Singapore, November 19th, 2025, CyberNewsWire The collaboration advances enterprise grade application security into decentralized ecosystems, uniting Checkmarx’s AppSec expertise…

Nova Stealer Targets macOS Users, Swaps Legit Apps to Steal Crypto Wallets
20
Nov
2025

Nova Stealer Targets macOS Users, Swaps Legit Apps to Steal Crypto Wallets

A sophisticated new macOS malware campaign dubbed “Nova Stealer” has emerged, targeting cryptocurrency users through an elaborate scheme that replaces…

Microsoft Teams Adds Option to Report Misidentified Threat Messages
20
Nov
2025

Microsoft Teams Adds Option to Report Misidentified Threat Messages

Microsoft Teams is rolling out a new feature that allows users to misreport messages flagged as security threats. The capability,…