Category: GBHackers

Massive WordPress Site Compromise Used to Execute Malicious Commands on Victims
27
Aug
2025

Massive WordPress Site Compromise Used to Execute Malicious Commands on Victims

A large-scale cybercrime conspiracy known as ShadowCaptcha was made public by cybersecurity researchers at Israel’s National Digital Agency. This campaign…

IPFire Firewall Admin Panel Vulnerability Enables Persistent JavaScript Injection
27
Aug
2025

IPFire Firewall Admin Panel Vulnerability Enables Persistent JavaScript Injection

A critical vulnerability in IPFire 2.29’s web-based firewall interface (firewall.cgi) allows authenticated administrators to inject persistent JavaScript code, leading to…

Hackers Abuse Compromised OAuth Tokens to Access and Steal Salesforce Corporate Data
27
Aug
2025

Hackers Abuse Compromised OAuth Tokens to Access and Steal Salesforce Corporate Data

Google Threat Intelligence Group (GTIG) has issued an advisory concerning a broad data theft operation targeting corporate Salesforce instances via…

Critical Chrome Use-After-Free Flaw Enables Arbitrary Code Execution
27
Aug
2025

Critical Chrome Use-After-Free Flaw Enables Arbitrary Code Execution

Google has released an urgent security update for the Chrome Stable channel to address a critical use-after-free vulnerability in the ANGLE graphics…

Citrix NetScaler ADC and Gateway Hit by Ongoing Attacks Exploiting 0-Day RCE
27
Aug
2025

Citrix NetScaler ADC and Gateway Hit by Ongoing Attacks Exploiting 0-Day RCE

Cloud Software Group has issued an emergency security bulletin warning of active exploitation targeting three critical vulnerabilities in NetScaler ADC and NetScaler…

New ZipLine Campaign Targets Critical Manufacturing Firms with In-Memory MixShell Malware
27
Aug
2025

New ZipLine Campaign Targets Critical Manufacturing Firms with In-Memory MixShell Malware

Check Point Research has uncovered a highly persistent phishing operation dubbed ZipLine, which reverses traditional attack vectors by exploiting victims’…

APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files
27
Aug
2025

APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files

Researchers have unveiled ONEFLIP, a novel inference-time backdoor attack that compromises full-precision deep neural networks (DNNs) by flipping just one…

Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks
27
Aug
2025

Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks

Cybersecurity landscapes are undergoing a paradigm shift as threat actors increasingly deploy agentic AI systems to orchestrate sophisticated social engineering…

China-Based Threat Actor Mustang Panda’s TTPs Leaked
26
Aug
2025

China-Based Threat Actor Mustang Panda’s TTPs Leaked

A significant milestone for cybersecurity experts is the disclosure of specific tactics, methods, and procedures (TTPs) used by Mustang Panda,…

Securden Unified PAM Flaw Allows Attackers to Bypass Authentication
26
Aug
2025

Securden Unified PAM Flaw Allows Attackers to Bypass Authentication

Securden Unified PAM is a comprehensive privileged access management platform that is used to store, manage, and monitor credentials across…

New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands
26
Aug
2025

New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands

Zimperium’s zLabs research team has identified a sophisticated new variant of the Hook Android banking trojan, marking a significant escalation…

CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited
26
Aug
2025

CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical vulnerability in Git (CVE-2025-48384) that…