Category: GBHackers

Denmark Issues Warning on Major Cyber Attacks Targeting Telecom Sector
18
Mar
2025

Denmark Issues Warning on Major Cyber Attacks Targeting Telecom Sector

Denmark has announced a heightened alert status for the telecommunications sector due to an increased threat from cyber attacks. According…

Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities
18
Mar
2025

Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities

Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability scanning and remediation across various software…

Espressif Systems Flaws Allow Hackers to Execute Arbitrary Code
18
Mar
2025

Espressif Systems Flaws Allow Hackers to Execute Arbitrary Code

A series of vulnerabilities has been discovered in Espressif Systems’ ESP32 devices, specifically affecting the BluFi module within the ESP-IDF…

Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution
18
Mar
2025

Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution

A critical vulnerability, identified as CVE-2025-24016, has been discovered in the Wazuh Security Information and Event Management (SIEM) platform. This…

Kentico Xperience CMS Vulnerability Enables Remote Code Execution
18
Mar
2025

Kentico Xperience CMS Vulnerability Enables Remote Code Execution

In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light, highlighting significant risks for users who…

New C++-Based IIS Malware Mimics cmd.exe to Evade Detection
18
Mar
2025

New C++-Based IIS Malware Mimics cmd.exe to Evade Detection

A recent discovery by Palo Alto Networks’ Unit 42 has shed light on sophisticated malware targeting Internet Information Services (IIS)…

New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers
18
Mar
2025

New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers

A recent cybersecurity threat has emerged in the form of a steganographic campaign that uses seemingly harmless JPG files to…

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware
17
Mar
2025

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware

SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the distribution of RansomHub ransomware. This…

MassJacker Clipper Malware Targets Users Installing Pirated Software
17
Mar
2025

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets users who download pirated software from…

Beware! Malware Hidden in Free Word-to-PDF Converters
17
Mar
2025

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion tools, which are being used to…

Supply Chain Attack Targets 23,000 GitHub Repositories
17
Mar
2025

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is used in over 23,000 repositories….

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks
17
Mar
2025

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction among cybercriminals and nation-state-sponsored groups….