Category: GBHackers

NVIDIA Container Toolkit Vulnerable to Code Execution Attacks
14
Feb
2025

NVIDIA Container Toolkit Vulnerable to Code Execution Attacks

NVIDIA has issued a critical security update to address a high-severity vulnerability discovered in the NVIDIA® Container Toolkit for Linux….

WinZip Vulnerability Allows Remote Attackers to Execute Arbitrary Code
14
Feb
2025

WinZip Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A newly discovered vulnerability in WinZip, a popular file compression and archiving utility, has raised alarms among cybersecurity experts. Identified…

Hackers Exploiting Newly Discovered PAN-OS Authentication Bypass Vulnerability
14
Feb
2025

Hackers Exploiting Newly Discovered PAN-OS Authentication Bypass Vulnerability

Threat actors actively exploit a new high-severity vulnerability, CVE-2025-0108, in Palo Alto Networks’ PAN-OS. This exploit allows attackers to bypass…

Device Code Phishing Attack Exploits Authentication Flow to Hijack Tokens
14
Feb
2025

Device Code Phishing Attack Exploits Authentication Flow to Hijack Tokens

A sophisticated phishing campaign leveraging the device code authentication flow has been identified by Microsoft Threat Intelligence, targeting a wide…

CISA Publishes 20 Advisories on ICS Security Flaws and Exploits
14
Feb
2025

CISA Publishes 20 Advisories on ICS Security Flaws and Exploits

 The Cybersecurity and Infrastructure Security Agency (CISA) has issued 20 security advisories on February 13, 2025, warning about critical vulnerabilities…

Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins
14
Feb
2025

Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins

A new phishing kit named Astaroth has emerged as a significant threat in the cybersecurity landscape by bypassing two-factor authentication…

AMD Ryzen Flaw Enables Code Execution Through DLL Hijacking
14
Feb
2025

AMD Ryzen Flaw Enables Code Execution Through DLL Hijacking

A security vulnerability has been identified in the AMD Ryzen™ Master Utility, a performance-tuning tool for AMD Ryzen™ processors. This flaw, discovered by a security researcher,…

Dutch Authorities Dismantle Network of 127 Command-and-Control Servers
14
Feb
2025

Dutch Authorities Dismantle Network of 127 Command-and-Control Servers

Dutch police and the Public Prosecution Service have taken down a network of 127 command-and-control servers. This network was operated…

Apache Fineract SQL Injection Vulnerability Allows Malicious Data Injection
14
Feb
2025

Apache Fineract SQL Injection Vulnerability Allows Malicious Data Injection

The Apache Software Foundation has disclosed a critical SQL injection vulnerability in its widely utilized financial platform, Apache Fineract. The…

61 Vulnerabilities Including 25 RCE's Fixed
11
Feb
2025

61 Vulnerabilities Including 25 RCE’s Fixed

Microsoft has released its highly anticipated Patch Tuesday security updates for February 2025, addressing a wide range of vulnerabilities across…

Assessing the Viability of Single-Bit Fault Injection Attacks
11
Feb
2025

Assessing the Viability of Single-Bit Fault Injection Attacks

The realm of fault injection attacks has long intrigued researchers and security professionals. Among these, single-bit fault injection, a technique…

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions
11
Feb
2025

Preventing Attackers from Permanently Deleting Entra ID Accounts with Protected Actions

Microsoft Entra ID has introduced a robust mechanism called protected actions to mitigate the risks associated with unauthorized hard deletions…