Category: GBHackers

New Burp Suite Extension for Secret Scanning Released
18
Mar
2025

New Burp Suite Extension for Secret Scanning Released

A new extension for Burp Suite has been released, integrating the powerful secret scanning capabilities of TruffleHog. This innovative integration…

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers
18
Mar
2025

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator tool. This decision comes on the…

Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams
18
Mar
2025

Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams

Cobalt Strike, a highly advanced threat emulation tool, has released version 4.11, packing a robust suite of features designed to…

PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability
18
Mar
2025

PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability

A proof-of-concept (PoC) exploit has been released for a use-after-free vulnerability in the Linux kernel, identified as CVE-2024-36904. This vulnerability…

Denmark Issues Warning on Major Cyber Attacks Targeting Telecom Sector
18
Mar
2025

Denmark Issues Warning on Major Cyber Attacks Targeting Telecom Sector

Denmark has announced a heightened alert status for the telecommunications sector due to an increased threat from cyber attacks. According…

Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities
18
Mar
2025

Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities

Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability scanning and remediation across various software…

Espressif Systems Flaws Allow Hackers to Execute Arbitrary Code
18
Mar
2025

Espressif Systems Flaws Allow Hackers to Execute Arbitrary Code

A series of vulnerabilities has been discovered in Espressif Systems’ ESP32 devices, specifically affecting the BluFi module within the ESP-IDF…

Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution
18
Mar
2025

Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution

A critical vulnerability, identified as CVE-2025-24016, has been discovered in the Wazuh Security Information and Event Management (SIEM) platform. This…

Kentico Xperience CMS Vulnerability Enables Remote Code Execution
18
Mar
2025

Kentico Xperience CMS Vulnerability Enables Remote Code Execution

In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light, highlighting significant risks for users who…

New C++-Based IIS Malware Mimics cmd.exe to Evade Detection
18
Mar
2025

New C++-Based IIS Malware Mimics cmd.exe to Evade Detection

A recent discovery by Palo Alto Networks’ Unit 42 has shed light on sophisticated malware targeting Internet Information Services (IIS)…

New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers
18
Mar
2025

New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers

A recent cybersecurity threat has emerged in the form of a steganographic campaign that uses seemingly harmless JPG files to…

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware
17
Mar
2025

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware

SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the distribution of RansomHub ransomware. This…