Category: GBHackers

Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers
02
Apr
2025

Google Cloud Platform Vulnerability Exposes Sensitive Data to Attackers

A privilege escalation vulnerability in Google Cloud Platform (GCP), dubbed “ImageRunner,” was recently discovered and fixed. The flaw, which Tenable…

20,000 WordPress Sites at Risk of File Upload & Deletion Exploits
02
Apr
2025

20,000 WordPress Sites at Risk of File Upload & Deletion Exploits

A critical security alert has been issued to WordPress site administrators following the discovery of two high-severity vulnerabilities in the…

Google Introduces End-to-End Encryption for Gmail Business Users
02
Apr
2025

Google Introduces End-to-End Encryption for Gmail Business Users

Google has unveiled end-to-end encryption (E2EE) capabilities for Gmail enterprise users, simplifying encrypted email communication for businesses of all sizes….

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time
02
Apr
2025

New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time

A persistent Linux malware known as “Outlaw” has been identified leveraging unsophisticated yet effective techniques to maintain a long-running botnet….

Hackers Exploit Microsoft Teams Messages to Deliver Malware
02
Apr
2025

Hackers Exploit Microsoft Teams Messages to Deliver Malware

Cybersecurity experts have uncovered a new malware campaign targeting Microsoft Teams users to infiltrate corporate systems. By exploiting the platform’s…

Python Introduces New Standard Lock File Format for Enhanced Security
02
Apr
2025

Python Introduces New Standard Lock File Format for Enhanced Security

The Python Software Foundation (PSF) has officially announced the adoption of a new standardized lock file format, outlined in PEP 751….

Hackers Exploiting Vulnerabilities in SonicWall, Zoho, F5 & Ivanti Systems
02
Apr
2025

Hackers Exploiting Vulnerabilities in SonicWall, Zoho, F5 & Ivanti Systems

A surge in cyber activity targeting critical edge technologies and management tools, including SonicWall, Zoho, F5, Ivanti, and other systems,…

CISA Alerts on Active Exploitation of Apache Tomcat Vulnerability
02
Apr
2025

CISA Alerts on Active Exploitation of Apache Tomcat Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert regarding the active exploitation of CVE-2025-24813, a critical…

HijackLoader Evolves with New Modules for Stealth and Malware Analysis Evasion
02
Apr
2025

HijackLoader Evolves with New Modules for Stealth and Malware Analysis Evasion

HijackLoader, a malware loader first identified in 2023, has undergone significant evolution with the addition of new modules designed to…

Plantronics Hub Flaw Allows Attackers to Gain Elevated Privileges
02
Apr
2025

Plantronics Hub Flaw Allows Attackers to Gain Elevated Privileges

A critical vulnerability has been identified in the Plantronics Hub software, a client application commonly used to configure Plantronics audio…

APT34 Deploys Custom Malware Targeting Finance and Telecom Sectors
02
Apr
2025

APT34 Deploys Custom Malware Targeting Finance and Telecom Sectors

APT34, also known as OilRig or Helix Kitten, has intensified its cyber-espionage campaigns, deploying custom malware to target entities within…

KoiLoader Exploits PowerShell Scripts to Drop Malicious Payloads
02
Apr
2025

KoiLoader Exploits PowerShell Scripts to Drop Malicious Payloads

Cybersecurity experts at eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging KoiLoader, a malicious loader designed to…