Category: GBHackers

A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear
10
Apr
2025

A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear

A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat to global network infrastructure due to…

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks
10
Apr
2025

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against critical sectors within the Russian Federation,…

The State of AI Malware and Defenses Against It
10
Apr
2025

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders awake. The increasing popularity of and…

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed
10
Apr
2025

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave over 100,000 websites at risk. The…

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks
10
Apr
2025

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has been observed targeting a Western country’s…

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users
10
Apr
2025

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected to be Arabic speakers, have…

Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms
10
Apr
2025

Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client
10
Apr
2025

SonicWall Patches Multiple Vulnerabilities in NetExtender Windows Client

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Dell Alerts Users to Critical PowerScale OneFS Flaws Enabling Account Takeover
10
Apr
2025

Dell Alerts Users to Critical PowerScale OneFS Flaws Enabling Account Takeover

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Langflow AI Builder Vulnerability Allows Remote Server Takeover by Attackers
10
Apr
2025

Langflow AI Builder Vulnerability Allows Remote Server Takeover by Attackers

A critical security vulnerability has been discovered in the Langflow AI Builder, a popular tool for creating agentic AI workflows….

Powerful Post-Exploitation Toolkit for Active Directory Attacks
10
Apr
2025

Powerful Post-Exploitation Toolkit for Active Directory Attacks

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Hackers Claim WooCommerce Breach Exposing 4.4 Million Customer Records
10
Apr
2025

Hackers Claim WooCommerce Breach Exposing 4.4 Million Customer Records

A hacker operating under the alias “Satanic” has claimed responsibility for a massive data breach involving WooCommerce, a leading e-commerce…