Category: GBHackers

Telegram EvilVideo Vulnerability Exploited to Run Malicious Code on Victims’ Devices
05
Mar
2025

Telegram EvilVideo Vulnerability Exploited to Run Malicious Code on Victims’ Devices

A newly documented exploitation technique targeting Telegram’s file-sharing infrastructure has raised alarms in cybersecurity circles. Dubbed “EvilVideo,” this attack vector…

Zoho ADSelfService Plus Flaw Allows Hackers to Gain Unauthorized Access
05
Mar
2025

Zoho ADSelfService Plus Flaw Allows Hackers to Gain Unauthorized Access

A critical security flaw in Zoho’s widely used identity management solution, ADSelfService Plus, has been patched after researchers discovered it…

PoC Released for HPE Remote Support Tool Vulnerability Allowing Remote Code Execution
05
Mar
2025

PoC Released for HPE Remote Support Tool Vulnerability Allowing Remote Code Execution

Security researchers have released proof-of-concept (PoC) exploit code for critical vulnerabilities in Hewlett Packard Enterprise’s (HPE) Insight Remote Support (IRS)…

Windows KDC Proxy RCE Vulnerability Allows Remote Server Takeover
05
Mar
2025

Windows KDC Proxy RCE Vulnerability Allows Remote Server Takeover

A recently patched remote code execution (RCE) vulnerability in Microsoft Windows’ Key Distribution Center (KDC) Proxy implementation allows unauthenticated attackers…

Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities
05
Mar
2025

Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities

Google has rolled out Chrome 134 to the stable channel for Windows, macOS, and Linux, addressing 14 security vulnerabilities—including high-severity flaws…

NVIDIA Issues Warning About Severe Security Flaws Enabling Code Attacks
05
Mar
2025

NVIDIA Issues Warning About Severe Security Flaws Enabling Code Attacks

NVIDIA has issued an urgent security bulletin urging customers using its Hopper HGX 8-GPU High-Performance Computing (HMC) systems to immediately install firmware…

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps
05
Mar
2025

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities in over 49,000 access management systems…

GrassCall Malware Targets Job Seekers to Steal Login Credentials
05
Mar
2025

GrassCall Malware Targets Job Seekers to Steal Login Credentials

A newly identified cyberattack campaign, dubbed GrassCall, is targeting job seekers in the cryptocurrency and Web3 sectors through fake job…

Researchers Unveil APT28’s Advanced HTA Trojan Obfuscation Tactics
04
Mar
2025

Researchers Unveil APT28’s Advanced HTA Trojan Obfuscation Tactics

Security researchers have uncovered sophisticated obfuscation techniques employed by APT28, a Russian-linked advanced persistent threat (APT) group, in their HTA…

Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025
04
Mar
2025

Microsoft Removing DES Encryption from Windows 11 24H2 and Windows Server 2025

Microsoft has announced the removal of the Data Encryption Standard (DES) encryption algorithm from Kerberos in Windows 11 version 24H2…

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector
04
Mar
2025

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the United Arab Emirates has been uncovered…

Pathfinder AI - Hunters Announces New AI Capabilities for Smarter SOC Automation
04
Mar
2025

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters’ vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation and response. Hunters, the leader in…