Category: GBHackers

Google’s SafetyCore App Secretly Scans All Photos on Android Devices
27
Feb
2025

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing Apple’s recent controversy over photo scanning….

New "nRootTag" Attack Turns 1.5 Billion iPhones into Free Tracking Tools
27
Feb
2025

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network – the system powering AirTags and…

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide
27
Feb
2025

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the arrest of a prolific hacker linked…

27
Feb
2025

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability affecting its Nexus 3000 and…

New Wi-Fi Jamming Attack Can Disable Specific Devices
27
Feb
2025

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks with surgical precision, raising alarms…

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts
27
Feb
2025

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that could allow attackers to bypass…

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows
27
Feb
2025

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has been patched after researchers discovered it…

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS
27
Feb
2025

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000 Series Switches operating in standalone NX-OS…

Windows Virtualization-Based Security Exploited to Develop Highly Evasive Malware
27
Feb
2025

Windows Virtualization-Based Security Exploited to Develop Highly Evasive Malware

In a groundbreaking development, researchers have uncovered how attackers are exploiting Windows Virtualization-Based Security (VBS) enclaves to create malware that…

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections
27
Feb
2025

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections

A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting trojan, is leveraging PKG files with…

App with Over 100,000 Downloads from Google Play Steals User Data and Blackmails
27
Feb
2025

App with Over 100,000 Downloads from Google Play Steals User Data and Blackmails

A financial management app named Finance Simplified has been revealed as a malicious tool for stealing sensitive user data and…

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications
27
Feb
2025

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection during malware distribution. Attackers are…