Category: GBHackers

Python Introduces New Standard Lock File Format for Enhanced Security
02
Apr
2025

Python Introduces New Standard Lock File Format for Enhanced Security

The Python Software Foundation (PSF) has officially announced the adoption of a new standardized lock file format, outlined in PEP 751….

Hackers Exploiting Vulnerabilities in SonicWall, Zoho, F5 & Ivanti Systems
02
Apr
2025

Hackers Exploiting Vulnerabilities in SonicWall, Zoho, F5 & Ivanti Systems

A surge in cyber activity targeting critical edge technologies and management tools, including SonicWall, Zoho, F5, Ivanti, and other systems,…

CISA Alerts on Active Exploitation of Apache Tomcat Vulnerability
02
Apr
2025

CISA Alerts on Active Exploitation of Apache Tomcat Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert regarding the active exploitation of CVE-2025-24813, a critical…

HijackLoader Evolves with New Modules for Stealth and Malware Analysis Evasion
02
Apr
2025

HijackLoader Evolves with New Modules for Stealth and Malware Analysis Evasion

HijackLoader, a malware loader first identified in 2023, has undergone significant evolution with the addition of new modules designed to…

Plantronics Hub Flaw Allows Attackers to Gain Elevated Privileges
02
Apr
2025

Plantronics Hub Flaw Allows Attackers to Gain Elevated Privileges

A critical vulnerability has been identified in the Plantronics Hub software, a client application commonly used to configure Plantronics audio…

APT34 Deploys Custom Malware Targeting Finance and Telecom Sectors
02
Apr
2025

APT34 Deploys Custom Malware Targeting Finance and Telecom Sectors

APT34, also known as OilRig or Helix Kitten, has intensified its cyber-espionage campaigns, deploying custom malware to target entities within…

KoiLoader Exploits PowerShell Scripts to Drop Malicious Payloads
02
Apr
2025

KoiLoader Exploits PowerShell Scripts to Drop Malicious Payloads

Cybersecurity experts at eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging KoiLoader, a malicious loader designed to…

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices
02
Apr
2025

New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices

As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of…

Ransomware Threatens 93% of Industries— Resilience Is Critical
02
Apr
2025

Ransomware Threatens 93% of Industries— Resilience Is Critical

Ransomware continues to be one of the most disruptive cyber threats, with recent data revealing that it affects 93% of…

Sliver Framework Customized Enhances Evasion and Bypasses EDR Detection
02
Apr
2025

Sliver Framework Customized Enhances Evasion and Bypasses EDR Detection

The Sliver Command & Control (C2) framework, an open-source tool written in Go, has been a popular choice for offensive…

Microsoft Discovers GRUB2, U-Boot, and Barebox Bootloader Flaws with Copilot
01
Apr
2025

Microsoft Discovers GRUB2, U-Boot, and Barebox Bootloader Flaws with Copilot

Microsoft has disclosed the discovery of multiple critical vulnerabilities within the GRUB2, U-Boot, and Barebox bootloaders, leveraging its AI-driven Security…

Apple Issues Warning on Three 0-Day Vulnerabilities Under Active Exploitation
01
Apr
2025

Apple Issues Warning on Three 0-Day Vulnerabilities Under Active Exploitation

Apple has issued an urgent security advisory concerning three critical zero-day vulnerabilities – CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085 – which are being actively exploited in…