Category: GBHackers

1-Click ZITADEL Vulnerability Could Allow Full System Takeover
09
Mar
2026

1-Click ZITADEL Vulnerability Could Allow Full System Takeover

A critical Cross-Site Scripting (XSS) vulnerability has been discovered in ZITADEL, a popular open-source identity and access management platform. Tracked…

Nginx UI Vulnerabilities Let Attackers Download Full System Backups
09
Mar
2026

Nginx UI Vulnerabilities Let Attackers Download Full System Backups

A critical security flaw has been discovered in Nginx UI that allows unauthenticated threat actors to download and decrypt complete…

Hikvision Multiple Product Vulnerability Could Let Attackers Escalate Privileges
09
Mar
2026

Hikvision Multiple Product Vulnerability Could Let Attackers Escalate Privileges

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw affecting multiple Hikvision products to its…

Critical ExifTool Vulnerability Allows Malicious Images to Execute Code on macOS
09
Mar
2026

Critical ExifTool Vulnerability Allows Malicious Images to Execute Code on macOS

Many users believe macOS is inherently resistant to malware, but a newly discovered vulnerability proves otherwise. Kaspersky’s Global Research and…

CISA Alerts Users to Actively Exploited Vulnerabilities Impacting macOS and iOS
09
Mar
2026

CISA Alerts Users to Actively Exploited Vulnerabilities Impacting macOS and iOS

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding three actively exploited vulnerabilities affecting multiple Apple…

China-Nexus Hackers Target Telecommunication Providers with New Malware Attack
08
Mar
2026

China-Nexus Hackers Target Telecommunication Providers with New Malware Attack

A highly sophisticated China-linked threat actor, identified as UAT-9244, has been actively targeting critical telecommunications infrastructure across South America since…

New Linux Rootkits Leverage Advanced eBPF and io_uring Techniques for Stealthy Attacks
08
Mar
2026

New Linux Rootkits Leverage Advanced eBPF and io_uring Techniques for Stealthy Attacks

Linux rootkits have historically received less attention than their Windows counterparts, but the rapid adoption of Linux in cloud infrastructure,…

AWS-LC Flaw Exposes Amazon Users to Attacks by Bypassing Certificate Chain Validation
08
Mar
2026

AWS-LC Flaw Exposes Amazon Users to Attacks by Bypassing Certificate Chain Validation

Amazon issued a critical security bulletin (2026-005-AWS) detailing three high-severity vulnerabilities in AWS-LC, its open-source cryptographic library. Discovered through a…

Apache ActiveMQ Flaw Enables DoS Attacks via Malformed Network Packets
08
Mar
2026

Apache ActiveMQ Flaw Enables DoS Attacks via Malformed Network Packets

Security researchers have uncovered a significant vulnerability in Apache ActiveMQ, a popular open-source message broker used by enterprises to route…

AVideo Platform Vulnerability Allows Hackers to Hijack Streams via Zero-Click Command Injection
08
Mar
2026

AVideo Platform Vulnerability Allows Hackers to Hijack Streams via Zero-Click Command Injection

A highly critical security flaw has been disclosed in the AVideo platform, leaving media servers exposed to complete system takeover….

RMM Tools Crucial for IT Operations, But Growing Threat as Attackers Weaponize Them
08
Mar
2026

RMM Tools Crucial for IT Operations, But Growing Threat as Attackers Weaponize Them

Threat actors are increasingly weaponizing trusted administrative software to bypass security defenses. By exploiting legitimate software, cybercriminals gain persistent, hands-on-keyboard…

OpenAI’s Codex Security Built to Automate Vulnerability Discovery and Remediation
08
Mar
2026

OpenAI’s Codex Security Built to Automate Vulnerability Discovery and Remediation

OpenAI has officially introduced Codex Security, an advanced application security agent designed to automate vulnerability discovery and remediation. Formerly known…