Category: GBHackers

Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability
06
Nov
2025

Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability

Cisco has issued a critical warning about ongoing attacks targeting a severe remote code execution vulnerability affecting its Secure Firewall,…

Critical Bug in Midnight Ransomware Tool Unlocks File Recovery
06
Nov
2025

Critical Bug in Midnight Ransomware Tool Unlocks File Recovery

In the ever-evolving landscape of cyber threats, a new ransomware strain, Midnight, has emerged, echoing the notorious tactics of its…

HTTP/2 ‘MadeYouReset’ Vulnerability Enable Denial-of-Service (DoS) Attacks
06
Nov
2025

HTTP/2 ‘MadeYouReset’ Vulnerability Enable Denial-of-Service (DoS) Attacks

A critical vulnerability discovered across numerous HTTP/2 implementations has exposed a dangerous protocol-level vulnerability that enables threat actors to orchestrate…

AI Browsers That Beat Paywalls by Imitating Humans
06
Nov
2025

AI Browsers That Beat Paywalls by Imitating Humans

The emergence of AI-powered browsers represents a significant shift in how artificial intelligence interacts with web content. However, it has…

Iranian Hackers Exploit RMM Tools to Target Academics and Foreign-Policy Experts
06
Nov
2025

Iranian Hackers Exploit RMM Tools to Target Academics and Foreign-Policy Experts

Proofpoint Threat Research has identified a previously unknown Iranian threat actor, dubbed UNK_SmudgedSerpent, that conducted sophisticated phishing campaigns against academics…

Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2
06
Nov
2025

Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2

Security researchers have uncovered a sophisticated attack campaign attributed to Kimsuky, the North Korean-backed threat group known for conducting espionage…

Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
06
Nov
2025

Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code

Cisco has issued a critical security advisory addressing two severe vulnerabilities in its Unified Contact Center Express (CCX) platform that…

Gootloader Returns with a New ZIP File Tactic to Conceal Malicious Payloads
06
Nov
2025

Gootloader Returns with a New ZIP File Tactic to Conceal Malicious Payloads

Cybersecurity researchers have discovered a resurgent Gootloader malware campaign employing sophisticated new evasion techniques that exploit ZIP archive manipulation to…

06
Nov
2025

Gootloader Returns with a New ZIP File Tactic to Conceal Malicious Payloads

Cybersecurity researchers have discovered a resurgent Gootloader malware campaign employing sophisticated new evasion techniques that exploit ZIP archive manipulation to…

ValleyRAT Campaign Targets Windows via WeChat and DingTalk
06
Nov
2025

ValleyRAT Campaign Targets Windows via WeChat and DingTalk

A sophisticated Windows remote-access trojan known as ValleyRAT has emerged as a high-confidence indicator of targeted intrusions against Chinese-language users…

Multiple Django Flaws Could Allow SQL Injection and Denial-of-Service Attacks
06
Nov
2025

Multiple Django Flaws Could Allow SQL Injection and Denial-of-Service Attacks

The Django development team has released critical security patches addressing two significant vulnerabilities that could expose applications to denial-of-service attacks…

Authorities Dismantle Large-Scale Credit Card Fraud Scheme Affecting 4.3 Million Users
06
Nov
2025

Authorities Dismantle Large-Scale Credit Card Fraud Scheme Affecting 4.3 Million Users

 Authorities across nine countries executed a coordinated crackdown on one of the largest credit card fraud networks ever dismantled. Operation…