Category: GBHackers

Arm Mali GPU Vulnerability Enables Bypass of MTE and Arbitrary Kernel Code Execution
27
May
2025

Arm Mali GPU Vulnerability Enables Bypass of MTE and Arbitrary Kernel Code Execution

A critical vulnerability, identified as CVE-2025-0072, has been discovered in the Arm Mali GPU driver, posing a significant threat to…

Hackers Exploit HTTP/2 Flaw to Launch Arbitrary Cross-Site Scripting Attacks
27
May
2025

Hackers Exploit HTTP/2 Flaw to Launch Arbitrary Cross-Site Scripting Attacks

A groundbreaking study from Tsinghua University and Zhongguancun Laboratory has uncovered critical vulnerabilities in modern web infrastructure, revealing that HTTP/2…

How Google Meet Pages Are Exploited to Deliver PowerShell Malware
27
May
2025

How Google Meet Pages Are Exploited to Deliver PowerShell Malware

A new wave of cyberattacks exploits user trust in Google Meet by deploying meticulously crafted fake meeting pages that trick…

Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data
27
May
2025

Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data

Cybersecurity experts have noted an increase in data breaches where threat actors are directly querying internal databases to steal sensitive…

Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials
27
May
2025

Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials

Katz Stealer has emerged as a potent credential-stealing malware-as-a-service, targeting popular web browsers such as Chrome, Edge, Brave, and Firefox….

Fake DigiYatra Apps Target Indian Users to Steal Financial Data
27
May
2025

Fake DigiYatra Apps Target Indian Users to Steal Financial Data

Threat actors have been exploiting the trust in India’s digital public infrastructure by setting up a deceptive phishing site, digiyatra[.]in,…

FBI Issues on Silent Ransom Group Using Fake IT Support Calls to Target Victims
26
May
2025

FBI Issues on Silent Ransom Group Using Fake IT Support Calls to Target Victims

The Federal Bureau of Investigation (FBI) has issued a critical alert regarding the escalating activities of the cyber threat actor…

ChatGPT Deep Research Now Integrates with Dropbox and OneDrive to Retrieve Data
26
May
2025

ChatGPT Deep Research Now Integrates with Dropbox and OneDrive to Retrieve Data

ChatGPT has rolled out a beta feature called Deep Research Connectors, designed to integrate seamlessly with third-party applications such as…

Hackers Reportedly Selling Over 500 Stolen Crypto Databases on Dark-Web Forums
26
May
2025

Hackers Reportedly Selling Over 500 Stolen Crypto Databases on Dark-Web Forums

A hackers has made news by allegedly selling a ZIP archive containing more than 500 compromised databases, which seems to…

Meteobridge web interface Vulnerability Let Attackers Inject Commands Remotely
26
May
2025

Meteobridge web interface Vulnerability Let Attackers Inject Commands Remotely

ONEKEY Research Lab has uncovered a severe command injection vulnerability in the MeteoBridge firmware, a compact device designed to connect…

60 Malicious npm Packages Exfiltrate Hostnames, IP Addresses, and DNS Server Details
26
May
2025

60 Malicious npm Packages Exfiltrate Hostnames, IP Addresses, and DNS Server Details

A Socket’s Threat Research Team has revealed a sophisticated and ongoing campaign targeting the npm ecosystem, involving 60 malicious packages…

Sophisticated Hacker Group Targeting Government and Enterprise Networks
26
May
2025

Sophisticated Hacker Group Targeting Government and Enterprise Networks

A decade-long cyber espionage campaign orchestrated by the advanced persistent threat (APT) group TA-ShadowCricket has been exposed through a joint…