Category: GBHackers

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code
05
Feb
2025

Veeam Backup Vulnerability Allows Attackers to Execute Arbitrary Code

A critical vulnerability, CVE-2025-23114, has been discovered within the Veeam Updater component that poses a serious risk to organizations utilizing…

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers
05
Feb
2025

CISA Releases New Guidelines to Secure Firewalls, Routers, and Internet-Facing Servers

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new set of guidelines to fortify firewalls, routers, internet-facing servers,…

Cybercriminals Exploiting HTTP Client Tools to Hijack Microsoft 365 Accounts
04
Feb
2025

Cybercriminals Exploiting HTTP Client Tools to Hijack Microsoft 365 Accounts

A recent report by Proofpoint has revealed an alarming trend of cybercriminals exploiting HTTP client tools to target Microsoft 365…

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access
04
Feb
2025

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a total of 47 vulnerabilities affecting Android…

1- Click RCE Vulnerability In Voyager PHP Allow Attackers Execute Arbitrary code in Server
04
Feb
2025

1- Click RCE Vulnerability In Voyager PHP Allow Attackers Execute Arbitrary code in Server

A recently disclosed security vulnerability in the Voyager PHP package, a popular tool for managing Laravel applications, has raised significant…

Apache Cassandra Vulnerability Allows Attackers to Gain Access Data Centers
04
Feb
2025

Apache Cassandra Vulnerability Allows Attackers to Gain Access Data Centers

In a recent security advisory, a moderate-severity vulnerability has been identified in Apache Cassandra, potentially allowing unauthorized users to access…

ANY.RUN Enhances Malware Detection and Performance to Combat 2025 Cyber Threats
04
Feb
2025

ANY.RUN Enhances Malware Detection and Performance to Combat 2025 Cyber Threats

As cyber threats grow more sophisticated, ANY.RUN has unveiled a series of updates aimed at improving malware detection, analysis, and…

SpyCloud Leads the Way in Comprehensive Identity Threat Protection
04
Feb
2025

SpyCloud Leads the Way in Comprehensive Identity Threat Protection

SpyCloud, a leading identity threat protection company, has unveiled key innovations in its portfolio, driving a shift towards holistic identity…

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools
04
Feb
2025

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed “Tiny FUD,” has emerged, showcasing sophisticated evasion techniques capable of…

Beware of SmartApeSG Campaigns that Deliver NetSupport RAT
04
Feb
2025

Beware of SmartApeSG Campaigns that Deliver NetSupport RAT

SmartApeSG, a FakeUpdate cyber threat, has emerged as a significant vector for delivering NetSupport RAT, a maliciously exploited remote administration…

Apple service ticket portal Vulnerability Leaks Sensitive Information
04
Feb
2025

Apple service ticket portal Vulnerability Leaks Sensitive Information

Apple, one of the most trusted technology brands in the world, recently faced a critical security exposure in its service…

Amazon Introduces Redshift Security Features to Prevent Data Leaks
04
Feb
2025

Amazon Introduces Redshift Security Features to Prevent Data Leaks

Amazon Web Services (AWS) has announced significant updates to its popular data warehousing service, Amazon Redshift, with the introduction of…