Category: GBHackers

QNAP Flaw Allows Attackers to Bypass Authentication
30
Aug
2025

QNAP Flaw Allows Attackers to Bypass Authentication

QNAP Systems has released security patches to address multiple vulnerabilities affecting QVR firmware in legacy VioStor Network Video Recorder (NVR)…

Citrix 0-Day Flaw Under Active Exploitation Since May
30
Aug
2025

Citrix 0-Day Flaw Under Active Exploitation Since May

Security researcher Kevin Beaumont has revealed alarming details about CVE-2025-6543, a critical Citrix NetScaler vulnerability that was actively exploited as…

Amazon Takes Down Russian APT29 Infrastructure Targeting Users
30
Aug
2025

Amazon Takes Down Russian APT29 Infrastructure Targeting Users

Amazon’s cybersecurity team has successfully disrupted a sophisticated watering hole campaign orchestrated by APT29, a notorious hacking group linked to…

WhatsApp Zero-Day Vulnerability Exploited with 0-Click Attacks to Hack Apple Devices
29
Aug
2025

WhatsApp Zero-Day Vulnerability Exploited with 0-Click Attacks to Hack Apple Devices

WhatsApp has issued a critical security advisory addressing a newly discovered zero-day vulnerability, tracked as CVE-2025-55177, which has been exploited…

Popular Nx Packages Compromised by Credential-Stealing Malware
29
Aug
2025

Popular Nx Packages Compromised by Credential-Stealing Malware

A widespread supply chain attack on the popular Nx build system has compromised dozens of high-traffic packages, exposing sensitive credentials…

VS Code Marketplace Abused by Threat Actors to Deliver Malware via Trusted Extensions
29
Aug
2025

VS Code Marketplace Abused by Threat Actors to Deliver Malware via Trusted Extensions

A recently uncovered vulnerability in the Visual Studio Code (VS Code) Marketplace has allowed malicious actors to hijack discontinued extension…

Weaponized PDFs and LNK Files Used in Windows Attacks
29
Aug
2025

Weaponized PDFs and LNK Files Used in Windows Attacks

A clandestine campaign in which threat actors are weaponizing a legitimate-looking PDF document, titled “국가정보연구회 소식지 (52호)” (National Intelligence Research…

AppSuite PDF Editor Exploit Lets Hackers Run Arbitrary Commands
29
Aug
2025

AppSuite PDF Editor Exploit Lets Hackers Run Arbitrary Commands

A sophisticated backdoor in AppSuite PDF Editor that enables threat actors to execute arbitrary commands on compromised Windows systems. Initially…

Critical Hikvision Vulnerabilities Allow Remote Command Injection
29
Aug
2025

Critical Hikvision Vulnerabilities Allow Remote Command Injection

On August 28, 2025, the Hikvision Security Response Center (HSRC) issued Security Advisory SN No. HSRC-202508-01, detailing three critical vulnerabilities…

VirusTotal Launches Endpoint That Explains Code Functionality for Malware Analysts
29
Aug
2025

VirusTotal Launches Endpoint That Explains Code Functionality for Malware Analysts

Virustotal today unveiled a powerful addition to its Code Insight suite: a dedicated API endpoint that accepts code snippets—either disassembled…

29
Aug
2025

Popular Nx Packages Compromised by Credential-Stealing Malware

A widespread supply chain attack on the popular Nx build system has compromised dozens of high-traffic packages, exposing sensitive credentials…

TransUnion Data Breach Compromises Over 4 Million Customers
29
Aug
2025

TransUnion Data Breach Compromises Over 4 Million Customers

In a significant data breach disclosed by TransUnion LLC, more than 4.4 million consumers had sensitive personal information compromised in…