Category: GBHackers

IBM Storage Virtualize Flaws Allow Remote Code Execution
04
Mar
2025

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass authentication protections and execute malicious code…

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution
04
Mar
2025

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring solution has raised alarms across the…

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw
04
Mar
2025

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March 3, 2025, about actively exploiting a…

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs
03
Mar
2025

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices and network routers has surged…

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge
03
Mar
2025

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky’s latest report on mobile malware evolution in 2024 reveals a significant increase in cyber threats targeting mobile devices. The…

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection
03
Mar
2025

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption by threat actors to shield…

Space Pirates Hackers Attacking IT organizations With LuckyStrike Using OneDrive
03
Mar
2025

Space Pirates Hackers Attacking IT organizations With LuckyStrike Using OneDrive

A recent investigation by cybersecurity experts has unveiled a series of advanced cyberattacks orchestrated by the notorious Advanced Persistent Threat…

Paragon Partition Manager Vulnerabilities Allow Attackers to Escalate Privileges and Trigger DoS Attacks
03
Mar
2025

Paragon Partition Manager Vulnerabilities Allow Attackers to Escalate Privileges and Trigger DoS Attacks

Security researchers have uncovered five significant vulnerabilities in Paragon Partition Manager’s BioNTdrv.sys driver, affecting versions prior to 2.0.0. These flaws,…

North Korean IT Workers Hide Their IPs Using Astrill VPN
03
Mar
2025

North Korean IT Workers Hide Their IPs Using Astrill VPN

Security researchers have uncovered new evidence that North Korean threat actors, particularly the Lazarus Group, are actively using Astrill VPN…

Njrat Exploits Microsoft Dev Tunnels for C2 Communication
03
Mar
2025

Njrat Exploits Microsoft Dev Tunnels for C2 Communication

A new campaign involving the notorious remote access trojan (RAT) Njrat has been uncovered, leveraging Microsoft’s Dev Tunnels service for…

Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data
03
Mar
2025

Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data

Cybersecurity researchers have uncovered a sophisticated phishing campaign leveraging Google Ads and PayPal’s infrastructure to deceive users and steal sensitive…

U.S. Suspends Cyberattacks Against Russia
03
Mar
2025

U.S. Suspends Cyberattacks Against Russia

The United States has suspended offensive cyber operations against Russia under an order issued by Defense Secretary Pete Hegseth, according…