Category: GBHackers

Moodle Core vulnerabilities Allow Attackers to Evade Security Measures
23
Apr
2025

Moodle Core vulnerabilities Allow Attackers to Evade Security Measures

A recent security audit has uncovered critical vulnerabilities within Moodle, the widely used open-source learning management system (LMS). These vulnerabilities…

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With no expiration!
22
Apr
2025

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With no expiration!

A glaring vulnerability has come to light within Samsung’s One UI interface: the clipboard history function stores all copied text,…

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index
22
Apr
2025

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro’s Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that timely patching plays in reducing an…

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft
22
Apr
2025

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on the Python Package Index (PyPI)…

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans
22
Apr
2025

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure named “Cloudflare tunnel infrastructure to…

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs
22
Apr
2025

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge devices playing a critical role…

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload
22
Apr
2025

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting systems. This utility, intended for…

Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025 - GBHackers Security
22
Apr
2025

Criminal IP to Showcase Advanced Threat Intelligence at RSAC 2025 – GBHackers Security

Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 – May 1, 2025 Criminal IP,…

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands
22
Apr
2025

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks
22
Apr
2025

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious npm packages that are nefariously exploiting…

Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation
22
Apr
2025

Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation

Researchers have uncovered a sophisticated new variant of the notorious Lumma InfoStealer malware, employing advanced code flow obfuscation techniques to…

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands
22
Apr
2025

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands

A new malware named “RustoBot” has been discovered exploiting vulnerabilities in various router models to gain unauthorized access and initiate…