Category: GBHackers

70 Million Devices Vulnerable Due to Logic Flaw Exposing Internal Networks
18
Nov
2025

70 Million Devices Vulnerable Due to Logic Flaw Exposing Internal Networks

A critical logic flaw discovered in the widely used mPDF PHP library could expose internal networks and sensitive services on…

Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea
17
Nov
2025

Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea

Menlo Park, California, USA, November 17th, 2025, CyberNewsWire AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms (CNAPP),…

FortiWeb WAF Flaw Actively Exploited to Establish Admin Access and Seize Total Control
17
Nov
2025

FortiWeb WAF Flaw Actively Exploited to Establish Admin Access and Seize Total Control

Fortinet has released urgent security updates to address a critical vulnerability in its FortiWeb Web Application Firewall (WAF) that is…

Hackers Weaponize XWiki Flaw to Build and Rent Out Botnet Networks
17
Nov
2025

Hackers Weaponize XWiki Flaw to Build and Rent Out Botnet Networks

Cybersecurity researchers have observed a dramatic escalation in attacks exploiting a critical XWiki vulnerability, with multiple threat actors now leveraging…

New Detection Methods Uncovered for Outlook NotDoor Backdoor Malware
17
Nov
2025

New Detection Methods Uncovered for Outlook NotDoor Backdoor Malware

Cybersecurity researchers have unveiled comprehensive detection methodologies for NotDoor, a sophisticated backdoor malware that leverages Microsoft Outlook macros for covert…

North Korean Hackers Breach 136 U.S. Companies, Earning $2.2 Million
17
Nov
2025

North Korean Hackers Breach 136 U.S. Companies, Earning $2.2 Million

The U.S. Justice Department has announced a significant crackdown on North Korean cybercrime operations, securing five guilty pleas and initiating…

Alice Blue Partners With AccuKnox For Regulatory Compliance
17
Nov
2025

Alice Blue Partners With AccuKnox For Regulatory Compliance

AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms(CNAPP), today announced its partnership with Alice Blue India, a…

Iran-Linked SpearSpecter Campaign Leveraging Personalized Social Engineering Against High-Value Officials
17
Nov
2025

Iran-Linked SpearSpecter Campaign Leveraging Personalized Social Engineering Against High-Value Officials

Iranian threat actors aligned with the Islamic Revolutionary Guard Corps Intelligence Organization (IRGC-IO) are conducting a sophisticated espionage campaign tracked…

Critical RCE Flaws in AI Inference Engines Expose Meta, Nvidia, and Microsoft Frameworks
17
Nov
2025

Critical RCE Flaws in AI Inference Engines Expose Meta, Nvidia, and Microsoft Frameworks

Security researchers at Oligo Security have uncovered a series of critical Remote Code Execution vulnerabilities affecting widely deployed AI inference…

IBM AIX Flaw Allows Remote Attackers to Run Arbitrary Commands
17
Nov
2025

IBM AIX Flaw Allows Remote Attackers to Run Arbitrary Commands

IBM has released critical security updates addressing four severe vulnerabilities in AIX and VIOS systems that could allow remote attackers…

EVALUATION Campaign Using ClickFix Technique to Deploy Amatera Stealer and NetSupport RAT
17
Nov
2025

EVALUATION Campaign Using ClickFix Technique to Deploy Amatera Stealer and NetSupport RAT

eSentire’s Threat Response Unit (TRU) has uncovered a sophisticated malware campaign leveraging the ClickFix social engineering technique to distribute Amatera…

Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection
14
Nov
2025

Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection

Jamf Threat Labs has identified a new family of malicious stealers tracked as DigitStealer, representing a significant evolution in macOS-targeted…