Category: GBHackers

Cisco IMC Virtual Keyboard Vulnerability Allows Attackers to Redirect Users to Malicious Websites
28
Aug
2025

Cisco IMC Virtual Keyboard Vulnerability Allows Attackers to Redirect Users to Malicious Websites

Cisco has released urgent security updates to remediate a high-severity vulnerability in its Integrated Management Controller (IMC) virtual keyboard video…

Cisco UCS Manager Software Flaw Allows Attackers to Inject Malicious Commands
28
Aug
2025

Cisco UCS Manager Software Flaw Allows Attackers to Inject Malicious Commands

Cisco has released urgent security updates to remediate two medium-severity command injection vulnerabilities in its UCS Manager Software that could…

Threat Actors Exploit Velociraptor Incident Response Tool for Remote Access
28
Aug
2025

Threat Actors Exploit Velociraptor Incident Response Tool for Remote Access

Researchers from the Counter Threat Unit (CTU) at Sophos uncovered a sophisticated intrusion where threat actors repurposed the legitimate open-source…

Electronics Manufacturer Data I/O Suffers Ransomware Breach
28
Aug
2025

Electronics Manufacturer Data I/O Suffers Ransomware Breach

Data I/O Corporation, a well-known electronics firm that specializes in device programming and security provisioning solutions, revealed a ransomware attack…

Lazarus Group Targets Windows 11 with ClickFix Tactics and Fake Job Offers
28
Aug
2025

Lazarus Group Targets Windows 11 with ClickFix Tactics and Fake Job Offers

The notorious Lazarus advanced persistent threat (APT) organization, which Qi’anxin internally tracks as APT-Q-1, has been seen using the ClickFix…

ShadowSilk Targets Penetration-Testing Tools and Public Exploits to Breach Organizations
28
Aug
2025

ShadowSilk Targets Penetration-Testing Tools and Public Exploits to Breach Organizations

Cybersecurity experts discovered an advanced persistent threat (APT) cluster called ShadowSilk in a thorough research published by Group-IB. Since at…

U.S. Treasury Sanctions North Korean IT Worker Network Funding Weapons Programs
28
Aug
2025

U.S. Treasury Sanctions North Korean IT Worker Network Funding Weapons Programs

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has imposed sanctions on Russian national Vitaliy Sergeyevich…

New Research Explores Emulating Scattered Spider Tactics in Real-World Scenarios
28
Aug
2025

New Research Explores Emulating Scattered Spider Tactics in Real-World Scenarios

Experts have described methods for mimicking the strategies of the advanced persistent threat (APT) group Scattered Spider in a recent…

Cisco Nexus 3000 & 9000 Vulnerability Enables DoS Attacks
28
Aug
2025

Cisco Nexus 3000 & 9000 Vulnerability Enables DoS Attacks

Cisco has issued a high-severity security advisory warning of a dangerous vulnerability in its Nexus 3000 and 9000 Series switches…

Using dMSAs for Credential Theft and Lateral Movement in AD
28
Aug
2025

Using dMSAs for Credential Theft and Lateral Movement in AD

Akamai researchers evaluated Microsoft’s patch for the BadSuccessor vulnerability (CVE-2025-53779) to determine its scope and limitations. While the update effectively…

CISA Issues Alert on Citrix NetScaler 0-Day RCE Exploited in the Wild
28
Aug
2025

CISA Issues Alert on Citrix NetScaler 0-Day RCE Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert after detecting active exploitation of a critical zero-day…

New TamperedChef Attack Uses Weaponized PDF Editor to Steal Sensitive Data and Login Credentials
28
Aug
2025

New TamperedChef Attack Uses Weaponized PDF Editor to Steal Sensitive Data and Login Credentials

Cybersecurity researchers at Truesec have uncovered a sophisticated malware campaign distributing a weaponized PDF editor under the guise of “AppSuite…