Category: GBHackers

CISA Releases Guidelines For Closing Software Understanding Gap
17
Jan
2025

CISA Releases Guidelines For Closing Software Understanding Gap

The Cybersecurity and Infrastructure Security Agency (CISA) has released a pivotal report calling for urgent action to address the “software…

Russian Threat Actor "Star Blizzard" Exploit WhatsApp Accounts Using QR Codes
17
Jan
2025

Russian Threat Actor “Star Blizzard” Exploit WhatsApp Accounts Using QR Codes

Microsoft Threat Intelligence has identified a concerning strategic shift by the notorious Russian threat actor group “Star Blizzard.” Known for…

Thousands of PHP-based Web Applications Exploited to Deploy Malware
16
Jan
2025

Thousands of PHP-based Web Applications Exploited to Deploy Malware

A significant cybersecurity threat has emerged, threatening the integrity of thousands of PHP-based web applications. A report from Imperva Threat…

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware
16
Jan
2025

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet’s inception. Threat actors exploit vulnerabilities to…

AIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacks
16
Jan
2025

AIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August 2024 that leveraged a 0DAY vulnerability…

phishing domains
16
Jan
2025

Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks – GBHackers Security

As California grapples with devastating wildfires, communities are rallying to protect lives and property. Unfortunately, these disasters have also created…

FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches
16
Jan
2025

FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches

The Federal Trade Commission (FTC) has announced that it will require GoDaddy Inc. to develop and implement a comprehensive information…

Veeam Azure Backup Vulnerability Allows Attackers to Utilize SSRF & Send Unauthorized Requests
16
Jan
2025

Veeam Azure Backup Vulnerability Allows Attackers to Utilize SSRF & Send Unauthorized Requests

A critical vulnerability has been identified in Veeam Backup for Microsoft Azure, specifically referenced as CVE-2025-23082. Discovered during internal testing,…

W3 Total Cache Plugin Vulnerability Let Attackers Gain Unauthorized Access to Sensitive Data
16
Jan
2025

W3 Total Cache Plugin Vulnerability Let Attackers Gain Unauthorized Access to Sensitive Data

A significant security vulnerability has been identified in the W3 Total Cache plugin for WordPress, affecting all versions up to…

Microsoft Patches Outlook Zero-Click RCE Exploited Via Email
16
Jan
2025

Microsoft Patches Outlook Zero-Click RCE Exploited Via Email

Microsoft issued a critical security patch addressing a newly discovered vulnerability in Outlook, designated as CVE-2025-21298. This flaw, characterized as…

CISA Released Guide to Microsoft Expanded Cloud Playbook
16
Jan
2025

CISA Released Guide to Microsoft Expanded Cloud Playbook

The Cybersecurity and Infrastructure Security Agency (CISA) has released the “Microsoft Expanded Cloud Logs Implementation Playbook.” This guide is geared…

5,000 WordPress Sites Hacked in New WP3.XYZ Malware Attack
15
Jan
2025

5,000 WordPress Sites Hacked in New WP3.XYZ Malware Attack

Widespread malware campaigns detected by side crawlers exploit vulnerabilities on multiple websites where the intrusion method remains under investigation, with…