Category: GBHackers

Critical RCE Flaws in AI Inference Engines Expose Meta, Nvidia, and Microsoft Frameworks
17
Nov
2025

Critical RCE Flaws in AI Inference Engines Expose Meta, Nvidia, and Microsoft Frameworks

Security researchers at Oligo Security have uncovered a series of critical Remote Code Execution vulnerabilities affecting widely deployed AI inference…

IBM AIX Flaw Allows Remote Attackers to Run Arbitrary Commands
17
Nov
2025

IBM AIX Flaw Allows Remote Attackers to Run Arbitrary Commands

IBM has released critical security updates addressing four severe vulnerabilities in AIX and VIOS systems that could allow remote attackers…

EVALUATION Campaign Using ClickFix Technique to Deploy Amatera Stealer and NetSupport RAT
17
Nov
2025

EVALUATION Campaign Using ClickFix Technique to Deploy Amatera Stealer and NetSupport RAT

eSentire’s Threat Response Unit (TRU) has uncovered a sophisticated malware campaign leveraging the ClickFix social engineering technique to distribute Amatera…

Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection
14
Nov
2025

Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection

Jamf Threat Labs has identified a new family of malicious stealers tracked as DigitStealer, representing a significant evolution in macOS-targeted…

NVIDIA NeMo Flaw Enables Code Injection and Privilege Escalation Attacks
14
Nov
2025

NVIDIA NeMo Flaw Enables Code Injection and Privilege Escalation Attacks

NVIDIA has released critical security patches addressing two high-severity vulnerabilities in its NeMo Framework that could allow attackers to execute…

Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges
14
Nov
2025

Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges

A critical security vulnerability has been identified in the Cisco Catalyst Center Virtual Appliance that could enable authenticated, remote attackers…

Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers
14
Nov
2025

Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers

Cisco has disclosed critical security vulnerabilities affecting Cisco Unified Contact Center Express (Unified CCX) that could enable unauthenticated, remote attackers…

A piece of the code inside the vbs file with the last line commented out.
14
Nov
2025

Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials

Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT)…

Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques
14
Nov
2025

Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques

A new campaign leveraging Formbook malware has emerged, showcasing sophisticated multi-stage infection tactics that underscore the importance of analyzing more…

Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques
14
Nov
2025

Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques

Researchers at Group-IB have uncovered a sophisticated phishing framework that demonstrates how cybercriminals are industrializing credential theft through automation, evasion…

Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments
14
Nov
2025

Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments

Cisco Talos has identified an emerging threat from Kraken, a sophisticated cross-platform ransomware group that has emerged from the remnants…

Android Photo Frame App Infects Devices With Malware, Allows Full Remote Takeover
14
Nov
2025

Android Photo Frame App Infects Devices With Malware, Allows Full Remote Takeover

A recent investigation has uncovered alarming security vulnerabilities in Android-powered digital photo frames, turning what should be a simple home…