Category: GBHackers

MediaTek Issues Security Update to Patch Multiple Chipset Flaws
01
Sep
2025

MediaTek Issues Security Update to Patch Multiple Chipset Flaws

MediaTek today published its September 2025 Product Security Bulletin, disclosing and remediating a series of critical and moderate vulnerabilities in…

Fraudulent Scholarship Apps Target Students in “Defarud” Scam Campaign
01
Sep
2025

Fraudulent Scholarship Apps Target Students in “Defarud” Scam Campaign

An Android malware tracker named SikkahBot, active since July 2024 and explicitly targeting students in Bangladesh. Disguised as applications from…

Salesforce Publishes Forensic Guide After Series of Cyberattacks
01
Sep
2025

Salesforce Publishes Forensic Guide After Series of Cyberattacks

Salesforce has published a comprehensive forensic investigation guide aimed at empowering organizations to detect, analyze, and remediate security incidents within…

Critical ImageMagick Vulnerability Allows Remote Code Execution
01
Sep
2025

Critical ImageMagick Vulnerability Allows Remote Code Execution

A critical security vulnerability has been discovered in ImageMagick, the widely used open-source image processing software, that could allow attackers to execute…

Windows 11 25H2 Preview Build Released: Here’s What’s New
01
Sep
2025

Windows 11 25H2 Preview Build Released: Here’s What’s New

Microsoft has begun rolling out the Windows 11, version 25H2 (Build 26200.5074) preview to the Release Preview Channel, offering enthusiasts…

Hackers Exploit Windows Defender Policies to Shut Down EDR Agents
01
Sep
2025

Hackers Exploit Windows Defender Policies to Shut Down EDR Agents

Cybercriminals are now weaponizing Windows Defender Application Control (WDAC) policies to disable Endpoint Detection and Response (EDR) agents en masse….

APT Groups Weaponize Infostealer Malware in Precision Attacks
01
Sep
2025

APT Groups Weaponize Infostealer Malware in Precision Attacks

The cybersecurity landscape has witnessed a dangerous evolution as Advanced Persistent Threat (APT) groups increasingly weaponize opportunistic infostealer malware for…

Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files
01
Sep
2025

Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files

Red Hat has disclosed a critical security flaw in the Udisks daemon that allows unprivileged users to exploit an out-of-bounds…

Netskope Windows Client Vulnerability Enables Privilege Escalation via Rogue Server
31
Aug
2025

Netskope Windows Client Vulnerability Enables Privilege Escalation via Rogue Server

A serious security vulnerability in Netskope’s Windows client has been discovered that could allow attackers to escalate privileges from a…

Vulnerabilities in Sitecore CMS Platform Allow Excute Arbitrary Code Remotely
31
Aug
2025

Vulnerabilities in Sitecore CMS Platform Allow Excute Arbitrary Code Remotely

Security researchers at watchTowr Labs have uncovered a devastating chain of vulnerabilities in Sitecore Experience Platform that could allow attackers…

AI Waifu RAT Exploits Users with Advanced Social Engineering Tactics
31
Aug
2025

AI Waifu RAT Exploits Users with Advanced Social Engineering Tactics

A sophisticated new malware campaign has emerged that weaponizes artificial intelligence and social engineering to target niche online communities. Security…

Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach
30
Aug
2025

Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach

A sophisticated voice phishing operation has emerged as a significant threat to organizations worldwide, with cybercriminals successfully infiltrating Salesforce environments…