Category: GBHackers

QUIC-LEAK Vulnerability Allows Attackers to Drain Server Memory and Cause DoS
21
Aug
2025

QUIC-LEAK Vulnerability Allows Attackers to Drain Server Memory and Cause DoS

Security researchers at Imperva have disclosed a critical pre-handshake memory exhaustion vulnerability in the widely-used LSQUIC QUIC implementation that enables…

Operator of ‘Rapper Bot’ DDoS Botnet Faces Charges
21
Aug
2025

Operator of ‘Rapper Bot’ DDoS Botnet Faces Charges

Federal authorities have charged a 22-year-old Oregon man with operating one of the most powerful distributed denial-of-service (DDoS) botnets ever…

CISA Issues Four ICS Advisories on Vulnerabilities and Exploits
21
Aug
2025

CISA Issues Four ICS Advisories on Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) released four critical Industrial Control Systems (ICS) advisories on August 19, 2025, alerting…

Apple Confirms Critical 0-Day Under Active Attack – Immediate Update Urged
21
Aug
2025

Apple Confirms Critical 0-Day Under Active Attack – Immediate Update Urged

Apple has issued an emergency security update for iOS 18.6.2 and iPadOS 18.6.2 to address a critical zero-day vulnerability that…

Critical Flaw in Apache Tika PDF Parser Exposes Sensitive Data to Attackers
21
Aug
2025

Critical Flaw in Apache Tika PDF Parser Exposes Sensitive Data to Attackers

A critical XML External Entity (XXE) vulnerability has been discovered in Apache Tika’s PDF parser module, potentially allowing attackers to…

PromptFix Exploit Forces AI Browsers to Execute Hidden Malicious Commands
21
Aug
2025

PromptFix Exploit Forces AI Browsers to Execute Hidden Malicious Commands

Cybersecurity researchers have uncovered critical vulnerabilities in AI-powered browsers that allow attackers to manipulate artificial intelligence agents into executing malicious…

RingReaper Malware Targets Linux Servers, Stealthily Evading EDR Solutions
21
Aug
2025

RingReaper Malware Targets Linux Servers, Stealthily Evading EDR Solutions

A new malware campaign dubbed RingReaper has emerged, targeting servers with advanced post-exploitation capabilities that exploit the kernel’s io_uring asynchronous…

Google Unveils Enhanced Features to Empower Defenders and Strengthen AI Security
20
Aug
2025

Google Unveils Enhanced Features to Empower Defenders and Strengthen AI Security

Google Cloud has announced a suite of advanced security enhancements at the 2025 Security Summit, aimed at fortifying AI ecosystems…

Threat Actors Impersonate as Google support to sniff out Your login credentials
20
Aug
2025

Threat Actors Impersonate as Google support to sniff out Your login credentials

Threat actors are posing as Google support agents in an increasing number of complex social engineering attacks in order to…

A New Malware Loader Spreading Infostealers and Remote Access Trojans (RATs)
20
Aug
2025

A New Malware Loader Spreading Infostealers and Remote Access Trojans (RATs)

IBM X-Force has tracked QuirkyLoader, a sophisticated loader malware deployed by threat actors to distribute prominent families such as Agent…

Ransomware Attacks in Japan Surge by 1.4 Times, Signaling a Significant Increase in Cyber Threats
20
Aug
2025

Ransomware Attacks in Japan Surge by 1.4 Times, Signaling a Significant Increase in Cyber Threats

Japan saw a significant increase in ransomware attacks in the first half of 2025, with incidences increasing by about 1.4…

Threat Actors Exploit GenAI Platforms to Craft Sophisticated and Realistic Phishing Attacks
20
Aug
2025

Threat Actors Exploit GenAI Platforms to Craft Sophisticated and Realistic Phishing Attacks

The proliferation of generative AI (GenAI) platforms has revolutionized web-based services, enabling rapid code assistance, natural language processing, chatbot deployment,…