Category: GBHackers

Authorities Seize $31 Million Linked to Crypto Exchange Hack
04
Mar
2025

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance decentralized finance (DeFi) exploits. The coordinated…

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers
04
Mar
2025

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap’s Windows client software (CVE-2025-26849) enables attackers to decrypt sensitive system inventory files through a…

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability
04
Mar
2025

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows privilege escalation flaw, to its Known…

Google Warns of Critical Android Vulnerabilities Under Exploit
04
Mar
2025

Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited, targeted exploitation. These flaws, impacting…

BigAnt Server Vulnerability Lets Attackers Run Malicious Code Remotely
04
Mar
2025

BigAnt Server Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft’s enterprise chat server software has exposed ~50 internet-facing systems to unauthenticated remote code execution attacks….

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.
04
Mar
2025

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to achieve and maintain compliance with frameworks…

IBM Storage Virtualize Flaws Allow Remote Code Execution
04
Mar
2025

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass authentication protections and execute malicious code…

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution
04
Mar
2025

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring solution has raised alarms across the…

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw
04
Mar
2025

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March 3, 2025, about actively exploiting a…

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs
03
Mar
2025

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices and network routers has surged…

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge
03
Mar
2025

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky’s latest report on mobile malware evolution in 2024 reveals a significant increase in cyber threats targeting mobile devices. The…

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection
03
Mar
2025

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption by threat actors to shield…