Category: GBHackers

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code
21
Apr
2025

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning framework, allows attackers to execute arbitrary…

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store
21
Apr
2025

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store

A newly documented technique reveals how attackers can exploit the WinDbg Preview debugger to bypass even the strictest Windows Defender…

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR
21
Apr
2025

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

A notorious threat actor has allegedly begun selling “Baldwin Killer,” a sophisticated malware toolkit designed to bypass leading antivirus (AV)…

Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations
21
Apr
2025

Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

The Chinese hacker group known as Billbug, or Lotus Blossom, targeted high-profile organizations across Southeast Asia. The attackers, who were…

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools
21
Apr
2025

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers to bypass traditional Antivirus (AV) and Endpoint Detection and Response…

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions
21
Apr
2025

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed analysis of a sophisticated cyber campaign dubbed “Larva-24005,” linked to…

Linux 6.15-rc3 Released With Key Kernel Bug Fixes
21
Apr
2025

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a fresh batch of bug fixes and minor adjustments to the…

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers
21
Apr
2025

Hackers Abuse Zoom’s Remote Control to Access Users’ Computers

A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing Zoom’s remote control feature, allowing attackers…

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover
21
Apr
2025

Speedify VPN Vulnerability on macOS Exposes Users to System Takeover

A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has exposed millions of users to the…

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code
21
Apr
2025

ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code

ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising…

Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security
21
Apr
2025

Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security

A sophisticated phishing attack exploiting a loophole in Google’s OAuth infrastructure has surfaced, raising significant concerns about the security of…

Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds
20
Apr
2025

Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds

Organizations today face an ever-expanding threat landscape that requires sophisticated detection capabilities to identify and mitigate attacks before they cause…