Category: GBHackers

Google Removes 5.5 Billion Malicious Ads, Suspends 700,000+ Offending Advertisers
17
Apr
2025

Google Removes 5.5 Billion Malicious Ads, Suspends 700,000+ Offending Advertisers

Google has announced the removal of 5.5 billion malicious advertisements and the suspension of over 700,000 offending advertiser accounts in…

Cisco Webex Vulnerability Lets Hackers Execute Code Through Malicious Meeting Links
17
Apr
2025

Cisco Webex Vulnerability Lets Hackers Execute Code Through Malicious Meeting Links

Cisco has disclosed a high-severity vulnerability in its widely used Webex App, warning users that attackers could exploit the flaw…

CISA Extends Support a Last Minute to CVE Program
17
Apr
2025

CISA Extends Support a Last Minute to CVE Program

CISA announced an eleventh-hour contract extension with MITRE Corporation to maintain the Common Vulnerabilities and Exposures (CVE) program, narrowly avoiding…

2 Apple Zero-Day Vulnerabilities Actively Exploited in "Extremely" Sophisticated iOS Attacks
17
Apr
2025

2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

Apple has urgently rolled out iOS 18.4.1 and iPadOS 18.4.1 to patch two zero-day vulnerabilities that were actively exploited in…

Researchers Expose Medusa Ransomware Group’s Onion Site
17
Apr
2025

Researchers Expose Medusa Ransomware Group’s Onion Site

Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware groups, Medusa Locker. Known for targeting…

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control
16
Apr
2025

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

New vulnerabilities in Windows Task Scheduler’s schtasks.exe let attackers bypass UAC, alter metadata, modify event logs, and evade detection. These…

CISA Extend Funding to MITRE to Keep CVE Program Running
16
Apr
2025

CISA Extend Funding to MITRE to Keep CVE Program Running

The Cybersecurity and Infrastructure Security Agency (CISA) has extended funding to the MITRE Corporation, ensuring the continued operation of the…

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates
16
Apr
2025

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

The Interlock ransomware intrusion set has escalated its operations across North America and Europe with sophisticated techniques. Not falling under…

Windows NTLM Vulnerability Actively Exploit in the Wild to Hack Systems
16
Apr
2025

Windows NTLM Vulnerability Actively Exploit in the Wild to Hack Systems

A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025,…

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware
16
Apr
2025

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK’s Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been demonstrated to target individuals and organizations…

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials
16
Apr
2025

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

Attackers have been deploying server-side phishing schemes to compromise employee and member login portals across various enterprises. This strategic shift…

Hackers Target Investors Through Fraud Networks to Steal Financial Data
16
Apr
2025

Hackers Target Investors Through Fraud Networks to Steal Financial Data

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…