Category: GBHackers

Operation Sea Elephant Targets Organizations to Steal Research Data
05
Mar
2025

Operation Sea Elephant Targets Organizations to Steal Research Data

A sophisticated Advanced Persistent Threat (APT) group, known as CNC, has been conducting a cyber espionage campaign dubbed “Operation Sea…

Beware! Fake CAPTCHA Hidden LummaStealer Threat Installing Silently
05
Mar
2025

Beware! Fake CAPTCHA Hidden LummaStealer Threat Installing Silently

Cybersecurity researchers at G DATA have uncovered a sophisticated malware campaign utilizing fake booking websites to deliver the LummaStealer malware…

CISA Issues Alert on Actively Exploited VMware Vulnerabilities
05
Mar
2025

CISA Issues Alert on Actively Exploited VMware Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated warnings on March 4, 2025, by adding four severe vulnerabilities to…

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials
05
Mar
2025

Cisco Webex for BroadWorks Flaw Opens Door for Attackers to Access Credentials

Cisco Systems has disclosed a security vulnerability in its Webex for BroadWorks unified communications platform that could allow attackers to…

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability
05
Mar
2025

Over 10,000 WordPress Sites Exposed by Donation Plugin Code Execution Vulnerability

A critical security flaw in the widely used GiveWP – Donation Plugin and Fundraising Platform has left over 10,000 WordPress websites vulnerable…

U.S. Cracks Down on Nemesis Darknet Admin with New Treasury Sanctions
05
Mar
2025

U.S. Cracks Down on Nemesis Darknet Admin with New Treasury Sanctions

The U.S. Department of the Treasury has intensified its global campaign against darknet-facilitated drug trafficking by sanctioning Behrouz Parsarad, the…

Telegram EvilVideo Vulnerability Exploited to Run Malicious Code on Victims’ Devices
05
Mar
2025

Telegram EvilVideo Vulnerability Exploited to Run Malicious Code on Victims’ Devices

A newly documented exploitation technique targeting Telegram’s file-sharing infrastructure has raised alarms in cybersecurity circles. Dubbed “EvilVideo,” this attack vector…

Zoho ADSelfService Plus Flaw Allows Hackers to Gain Unauthorized Access
05
Mar
2025

Zoho ADSelfService Plus Flaw Allows Hackers to Gain Unauthorized Access

A critical security flaw in Zoho’s widely used identity management solution, ADSelfService Plus, has been patched after researchers discovered it…

PoC Released for HPE Remote Support Tool Vulnerability Allowing Remote Code Execution
05
Mar
2025

PoC Released for HPE Remote Support Tool Vulnerability Allowing Remote Code Execution

Security researchers have released proof-of-concept (PoC) exploit code for critical vulnerabilities in Hewlett Packard Enterprise’s (HPE) Insight Remote Support (IRS)…

Windows KDC Proxy RCE Vulnerability Allows Remote Server Takeover
05
Mar
2025

Windows KDC Proxy RCE Vulnerability Allows Remote Server Takeover

A recently patched remote code execution (RCE) vulnerability in Microsoft Windows’ Key Distribution Center (KDC) Proxy implementation allows unauthenticated attackers…

Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities
05
Mar
2025

Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities

Google has rolled out Chrome 134 to the stable channel for Windows, macOS, and Linux, addressing 14 security vulnerabilities—including high-severity flaws…

NVIDIA Issues Warning About Severe Security Flaws Enabling Code Attacks
05
Mar
2025

NVIDIA Issues Warning About Severe Security Flaws Enabling Code Attacks

NVIDIA has issued an urgent security bulletin urging customers using its Hopper HGX 8-GPU High-Performance Computing (HMC) systems to immediately install firmware…