Category: GBHackers

OpenSSH ProxyCommand Flaw Allows Remote Code Execution
07
Oct
2025

OpenSSH ProxyCommand Flaw Allows Remote Code Execution

Security researchers have uncovered a critical flaw in OpenSSH’s ProxyCommand feature that can be leveraged to achieve remote code execution…

CISA Issues Alert on Active Exploitation of Microsoft Windows Privilege Escalation Flaw
07
Oct
2025

CISA Issues Alert on Active Exploitation of Microsoft Windows Privilege Escalation Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a critical privilege escalation vulnerability in Microsoft…

GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware
07
Oct
2025

GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware

A critical zero-day vulnerability in GoAnywhere MFT’s License Servlet is being actively exploited to deploy Medusa ransomware. On September 18,…

Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances
07
Oct
2025

Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances

The hacker collective styling itself “Scattered Lapsus$ Hunters”—an alliance echoing elements of ShinyHunters, Scattered Spider, and Lapsus$—has launched an extortionware…

Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware
07
Oct
2025

Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware

The sophisticated China-linked threat actor Mustang Panda has refined its cyber espionage arsenal with an advanced DLL side-loading technique specifically targeting the…

NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability
07
Oct
2025

NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability

The UK National Cyber Security Centre (NCSC) has issued a security alert following confirmation of active exploitation of a critical…

A Scalable Solution for Global Privileged Access Management
06
Oct
2025

A Scalable Solution for Global Privileged Access Management

Reemo continues its mission to secure enterprise remote access and becomes the first French cybersecurity provider to protect all remote…

Technical Details and Exploit Released for Chrome Remote Code Execution Flaw
06
Oct
2025

Technical Details and Exploit Released for Chrome Remote Code Execution Flaw

A remote code execution vulnerability affecting Google Chrome’s WebAssembly engine has been publicly disclosed, along with a fully functional exploit….

Zabbix Agent/Agent2 for Windows Vulnerability Could Allow Privilege Escalation
06
Oct
2025

Zabbix Agent/Agent2 for Windows Vulnerability Could Allow Privilege Escalation

A security flaw in Zabbix Agent and Agent2 for Windows has been discovered that could allow a local attacker to…

New ‘Fully Undetectable’ Android RAT Discovered on GitHub
06
Oct
2025

New ‘Fully Undetectable’ Android RAT Discovered on GitHub

Hosted at the repository “Huckel789/Android-RAT,” this fully undetectable (FUD) RAT is designed to evade antivirus detection permanently, maintain persistence in…

Hackers Allegedly Breach Huawei Technologies, Leak Source Code and Internal Tools
06
Oct
2025

Hackers Allegedly Breach Huawei Technologies, Leak Source Code and Internal Tools

Cybersecurity researchers are reporting an alleged security breach involving Chinese technology giant Huawei Technologies, with hackers claiming to have accessed and…

TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors
06
Oct
2025

TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors

A sophisticated malware campaign dubbed TamperedChef has successfully compromised European organizations by masquerading as a legitimate PDF editor application, according…