Category: GBHackers

Securden Unified PAM Flaw Allows Attackers to Bypass Authentication
26
Aug
2025

Securden Unified PAM Flaw Allows Attackers to Bypass Authentication

Securden Unified PAM is a comprehensive privileged access management platform that is used to store, manage, and monitor credentials across…

New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands
26
Aug
2025

New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands

Zimperium’s zLabs research team has identified a sophisticated new variant of the Hook Android banking trojan, marking a significant escalation…

CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited
26
Aug
2025

CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical vulnerability in Git (CVE-2025-48384) that…

Google Introduces Enhanced Developer Verification for Play Store App Distribution
26
Aug
2025

Google Introduces Enhanced Developer Verification for Play Store App Distribution

Google has announced that all Android apps installed on approved devices will soon need to be able to be traced…

OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks
26
Aug
2025

OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks

CYFIRMA researchers have uncovered a campaign they have codenamed “OneFlip”, an operation that demonstrates how a single-bit modification inside a…

PoC Exploit Published for Chrome 0-Day Already Under Active Attack
26
Aug
2025

PoC Exploit Published for Chrome 0-Day Already Under Active Attack

A proof-of-concept exploit for a high-severity Google Chrome zero-day vulnerability has been published publicly, less than three months after the…

Weaponized PuTTY Delivered via Malicious Bing Ads Targets Kerberos and Active Directory services
26
Aug
2025

Weaponized PuTTY Delivered via Malicious Bing Ads Targets Kerberos and Active Directory services

Cybersecurity incidents increasingly exploit human vulnerabilities, including those of privileged users, as demonstrated in recent compromises involving trojanized versions of…

Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V
26
Aug
2025

Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V

Microsoft today announced the public preview of a new VM Conversion extension for Windows Admin Center, enabling IT administrators to migrate virtual…

Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware
26
Aug
2025

Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware

Threat actors are increasingly refining Android droppers to circumvent enhanced security measures, extending their utility beyond sophisticated banking trojans to…

Beware! Fake Google Play Store Sites Used to Spread Android Malware
26
Aug
2025

Beware! Fake Google Play Store Sites Used to Spread Android Malware

Cybersecurity researchers have identified a resurgence of SpyNote malware campaigns targeting Android users through sophisticated fake Google Play Store websites….

Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python
26
Aug
2025

Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python

A critical security risk has emerged for Windows users of WhatsApp Desktop who also have Python installed. Attackers can exploit…

Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection
26
Aug
2025

Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection

Google Threat Intelligence Group (GTIG) has uncovered a multifaceted cyber espionage operation attributed to the PRC-nexus threat actor UNC6384, believed…