Category: GBHackers

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware
05
Dec
2025

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware

Despite extensive scrutiny and public reporting, commercial surveillance vendors continue to operate with alarming sophistication. Intellexa, a prominent mercenary spyware…

Chained Synology BeeStation Vulnerabilities Enable Root Privilege Escalation via Task Scheduler Exploit
05
Dec
2025

Chained Synology BeeStation Vulnerabilities Enable Root Privilege Escalation via Task Scheduler Exploit

While preparing for Pwn2Own Ireland 2025, a security researcher revisiting N-day bugs in Synology NAS has demonstrated a powerful new…

New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT
05
Dec
2025

New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT

In November 2025, security researchers at Raven AI identified a sophisticated zero-day phishing campaign impersonating the Income Tax Department of…

Threat Actors Exploit Foxit PDF Reader to Seize System Access and Steal Data
05
Dec
2025

Threat Actors Exploit Foxit PDF Reader to Seize System Access and Steal Data

A sophisticated malware campaign is leveraging a weaponized Foxit PDF Reader to target job seekers through email-based attacks, deploying ValleyRAT….

Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report
05
Dec
2025

Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report

Austin, TX, USA, December 4th, 2025, CyberNewsWire Phishing has surged 400% year-over-year, highlighting need for real-time visibility into identity exposures….

K7 Antivirus Flaw Lets Attackers Gain SYSTEM-Level Privileges
04
Dec
2025

K7 Antivirus Flaw Lets Attackers Gain SYSTEM-Level Privileges

A critical security vulnerability has been discovered in K7 Ultimate Security antivirus software that allows attackers to gain the highest…

CISA Issues Five New ICS Advisories on Emerging Vulnerabilities and Exploits
04
Dec
2025

CISA Issues Five New ICS Advisories on Emerging Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) released five critical advisories on December 2, 2025, addressing high-severity vulnerabilities affecting industrial…

WordPress Plugin Vulnerability Under Active Attack, Allowing Remote Code Execution
04
Dec
2025

WordPress Plugin Vulnerability Under Active Attack, Allowing Remote Code Execution

A severe remote code execution vulnerability in the Sneeit Framework WordPress plugin is under active exploitation, with attackers launching thousands…

Marquis Data Breach Exposes Dozens of U.S. Banks and Credit Unions
04
Dec
2025

Marquis Data Breach Exposes Dozens of U.S. Banks and Credit Unions

A significant cybersecurity incident affecting multiple U.S. financial institutions came to light on November 26, 2025, when Marquis Software Solutions…

Hackers Weaponize Velociraptor DFIR for Stealthy C2 and Ransomware Deployment
04
Dec
2025

Hackers Weaponize Velociraptor DFIR for Stealthy C2 and Ransomware Deployment

Threat actors are increasingly weaponizing Velociraptor, a legitimate open-source digital forensics and incident response (DFIR) tool, to establish command-and-control (C2)…

Akamai Fixes HTTP Request Smuggling Flaw in Edge Servers
04
Dec
2025

Akamai Fixes HTTP Request Smuggling Flaw in Edge Servers

Akamai has fixed a vulnerability in its edge servers that could have allowed HTTP Request Smuggling attacks. The issue was…

Sryxen’ Malware Uses Headless Browser Trick to Bypass Chrome Protections
04
Dec
2025

Sryxen’ Malware Uses Headless Browser Trick to Bypass Chrome Protections

A new Windows-focused information stealer dubbed “Sryxen” is drawing attention in the security community for its blend of modern browser…