Category: GBHackers

Bitdefender Identifies Security Vulnerabilities Enabling Man-in-the-Middle Exploits
14
Mar
2025

Bitdefender Identifies Security Vulnerabilities Enabling Man-in-the-Middle Exploits

Cybersecurity firm Bitdefender has disclosed two high-severity security vulnerabilities affecting its legacy BOX v1 device, exposing users to potential remote…

Mozilla Issues Urgent Firefox Update Warning to Prevent Add-on Failures
13
Mar
2025

Mozilla Issues Urgent Firefox Update Warning to Prevent Add-on Failures

Mozilla has issued an urgent warning to all Firefox users, emphasizing the need to update their browsers before a critical…

North Korean Hackers Use Google Play Malware to Steal SMS, Calls & Screenshots
13
Mar
2025

North Korean Hackers Use Google Play Malware to Steal SMS, Calls & Screenshots

Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated Android surveillance tool dubbed “KoSpy,” which appears to be the…

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration
13
Mar
2025

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered by cybersecurity researcher Jeremiah Fowler. The…

Apache NiFi Vulnerability Exposes MongoDB Credentials to Attackers
13
Mar
2025

Apache NiFi Vulnerability Exposes MongoDB Credentials to Attackers

A critical security vulnerability has been identified in Apache NiFi, a popular open-source data integration tool. The vulnerability, tracked as…

Using AI-Driven Cybersecurity Training to Counter Emerging Threats
13
Mar
2025

Using AI-Driven Cybersecurity Training to Counter Emerging Threats

As Artificial Intelligence (AI)-powered cyber threats surge, INE Security, a global leader in cybersecurity training and certification, is launching a…

Blind Eagle Targets Organizations with Weaponized .URL Files to Steal User Hashes
13
Mar
2025

Blind Eagle Targets Organizations with Weaponized .URL Files to Steal User Hashes

In a significant development in the cybersecurity landscape, APT-C-36, more commonly known as Blind Eagle, has intensified its operations targeting…

Microsoft Finally Patches 2-Year-Old Windows Kernel Security Flaw
13
Mar
2025

Microsoft Finally Patches 2-Year-Old Windows Kernel Security Flaw

Microsoft has released a critical patch for a 2-year-old Windows kernel security vulnerability. This vulnerability, identified as CVE-2025-24983, allows attackers…

Hackers Exploiting JSPSpy To Manage Malicious Webshell Networks
13
Mar
2025

Hackers Exploiting JSPSpy To Manage Malicious Webshell Networks

Cybersecurity researchers have recently identified a cluster of JSPSpy web shell servers featuring an unexpected addition, Filebroser, a rebranded version…

Tenda AC7 Vulnerability Lets Hackers Execute Malicious Payloads for Root Access
13
Mar
2025

Tenda AC7 Vulnerability Lets Hackers Execute Malicious Payloads for Root Access

A vulnerability has been discovered in the Tenda AC7 router, firmware version V15.03.06.44, which allows attackers to execute malicious payloads…

Chinese Hacked Exploit Juniper Networks Routers to Implant Backdoor
13
Mar
2025

Chinese Hacked Exploit Juniper Networks Routers to Implant Backdoor

Cybersecurity researchers have uncovered a sophisticated cyber espionage campaign targeting critical network infrastructure, marking a significant evolution in tactics by…

GitLab Identifies Security Vulnerabilities Enabling Attacker Logins as Valid Users
13
Mar
2025

GitLab Identifies Security Vulnerabilities Enabling Attacker Logins as Valid Users

GitLab announced the release of versions 17.9.2, 17.8.5, and 17.7.7 for both its Community Edition (CE) and Enterprise Edition (EE)….