Category: GBHackers

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers
17
Feb
2025

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable remote code execution (RCE). These attacks…

Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries
17
Feb
2025

Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries

Threat actors are leveraging a modified version of the SharpHide tool to create hidden registry entries, significantly complicating detection and…

CISA Warns of Active Exploitation of Apple iOS Security Flaw
17
Feb
2025

CISA Warns of Active Exploitation of Apple iOS Security Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of active exploitation of a critical security…

Indian Post Office Portal Leak Exposes Thousands of KYC Records
17
Feb
2025

Indian Post Office Portal Leak Exposes Thousands of KYC Records

The Indian Post Office portal recently exposed the sensitive Know Your Customer (KYC) data of thousands of users due to…

Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues
17
Feb
2025

Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues

Linus Torvalds has announced the release of Linux Kernel 6.14-rc3, marking a critical milestone in stabilizing the upcoming 6.14 kernel…

Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild
14
Feb
2025

Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly being actively exploited by the Chinese…

NVIDIA Container Toolkit Vulnerable to Code Execution Attacks
14
Feb
2025

NVIDIA Container Toolkit Vulnerable to Code Execution Attacks

NVIDIA has issued a critical security update to address a high-severity vulnerability discovered in the NVIDIA® Container Toolkit for Linux….

WinZip Vulnerability Allows Remote Attackers to Execute Arbitrary Code
14
Feb
2025

WinZip Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A newly discovered vulnerability in WinZip, a popular file compression and archiving utility, has raised alarms among cybersecurity experts. Identified…

Hackers Exploiting Newly Discovered PAN-OS Authentication Bypass Vulnerability
14
Feb
2025

Hackers Exploiting Newly Discovered PAN-OS Authentication Bypass Vulnerability

Threat actors actively exploit a new high-severity vulnerability, CVE-2025-0108, in Palo Alto Networks’ PAN-OS. This exploit allows attackers to bypass…

Device Code Phishing Attack Exploits Authentication Flow to Hijack Tokens
14
Feb
2025

Device Code Phishing Attack Exploits Authentication Flow to Hijack Tokens

A sophisticated phishing campaign leveraging the device code authentication flow has been identified by Microsoft Threat Intelligence, targeting a wide…

CISA Publishes 20 Advisories on ICS Security Flaws and Exploits
14
Feb
2025

CISA Publishes 20 Advisories on ICS Security Flaws and Exploits

 The Cybersecurity and Infrastructure Security Agency (CISA) has issued 20 security advisories on February 13, 2025, warning about critical vulnerabilities…

Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins
14
Feb
2025

Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins

A new phishing kit named Astaroth has emerged as a significant threat in the cybersecurity landscape by bypassing two-factor authentication…