Category: GBHackers

Kibana CrowdStrike Connector Flaw Exposes Sensitive Credentials
07
Oct
2025

Kibana CrowdStrike Connector Flaw Exposes Sensitive Credentials

A security issue in the Kibana CrowdStrike Connector allows attackers to access stored CrowdStrike credentials. The flaw affects multiple versions…

Red Hat Breach Impacts 5,000+ High-Value Enterprise Customers, Data at Risk
07
Oct
2025

Red Hat Breach Impacts 5,000+ High-Value Enterprise Customers, Data at Risk

An extortion group calling itself Crimson Collective claimed responsibility for a major breach at Red Hat Consulting. With only 22…

CrowdStrike Alerts on Oracle E-Business Suite 0-Day Under Mass Exploitation
07
Oct
2025

CrowdStrike Alerts on Oracle E-Business Suite 0-Day Under Mass Exploitation

A novel zero-day vulnerability in Oracle E-Business Suite (CVE-2025-61882) is being actively exploited in a large-scale data exfiltration campaign, with…

Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day
07
Oct
2025

Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day

The notorious Cl0p ransomware group has been actively exploiting a critical zero-day vulnerability in Oracle’s E-Business Suite (EBS), targeting enterprise customers through…

Hackers Exploit Legitimate Commands to Breach Databases
07
Oct
2025

Hackers Exploit Legitimate Commands to Breach Databases

In recent years, adversaries have abandoned traditional malware in favor of “living-off-the-land” operations against cloud and SaaS environments. Rather than…

OpenSSH ProxyCommand Flaw Allows Remote Code Execution
07
Oct
2025

OpenSSH ProxyCommand Flaw Allows Remote Code Execution

Security researchers have uncovered a critical flaw in OpenSSH’s ProxyCommand feature that can be leveraged to achieve remote code execution…

CISA Issues Alert on Active Exploitation of Microsoft Windows Privilege Escalation Flaw
07
Oct
2025

CISA Issues Alert on Active Exploitation of Microsoft Windows Privilege Escalation Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a critical privilege escalation vulnerability in Microsoft…

GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware
07
Oct
2025

GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware

A critical zero-day vulnerability in GoAnywhere MFT’s License Servlet is being actively exploited to deploy Medusa ransomware. On September 18,…

Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances
07
Oct
2025

Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances

The hacker collective styling itself “Scattered Lapsus$ Hunters”—an alliance echoing elements of ShinyHunters, Scattered Spider, and Lapsus$—has launched an extortionware…

Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware
07
Oct
2025

Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware

The sophisticated China-linked threat actor Mustang Panda has refined its cyber espionage arsenal with an advanced DLL side-loading technique specifically targeting the…

NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability
07
Oct
2025

NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability

The UK National Cyber Security Centre (NCSC) has issued a security alert following confirmation of active exploitation of a critical…

A Scalable Solution for Global Privileged Access Management
06
Oct
2025

A Scalable Solution for Global Privileged Access Management

Reemo continues its mission to secure enterprise remote access and becomes the first French cybersecurity provider to protect all remote…