Category: GBHackers

Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups
11
Aug
2025

Legitimate System Functions Exploited to Steal Secrets in Shared Linux Setups

Security researcher Ionuț Cernica revealed how commonplace Linux utilities can be weaponized to siphon sensitive data in multi-tenant environments. His…

Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope
11
Aug
2025

Multiple Critical Flaws Hit Zero Trust Products from Check Point, Zscaler, and Netskope

Security researchers at AmberWolf have uncovered critical vulnerabilities in leading Zero Trust Network Access (ZTNA) solutions from major cybersecurity vendors,…

Malware Campaign Masquerades as Tesla in Poisoned Google Ads
11
Aug
2025

Malware Campaign Masquerades as Tesla in Poisoned Google Ads

A malware operation has surfaced in the context of a complex cyber threat landscape, using tainted Google Ads to pose…

Windows RPC Protocol Exploited to Launch Server Spoofing Attacks
11
Aug
2025

Windows RPC Protocol Exploited to Launch Server Spoofing Attacks

A vulnerability in Microsoft Windows’ Remote Procedure Call (RPC) protocol has been discovered that allows attackers to manipulate core system…

Linux Kernel Vulnerability Allows Attackers to Gain Full Kernel-Level Control From Chrome Sandbox
09
Aug
2025

Linux Kernel Vulnerability Allows Attackers to Gain Full Kernel-Level Control From Chrome Sandbox

August 9, 2025: A severe security vulnerability in the Linux kernel, dubbed CVE-2025-38236, has been uncovered by Google Project Zero…

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data
09
Aug
2025

Multiple Zero-Day Exploits Discover That Bypass BitLocker, Exposing All Encrypted Data

Microsoft security researchers have uncovered four critical vulnerabilities in Windows BitLocker that could allow attackers with physical access to bypass…

Over 28,000 Microsoft Exchange Servers Exposed Online to CVE-2025-53786 Vulnerability
09
Aug
2025

Over 28,000 Microsoft Exchange Servers Exposed Online to CVE-2025-53786 Vulnerability

The cybersecurity community faces a significant threat as scanning data reveals over 28,000 unpatched Microsoft Exchange servers remain exposed on…

A Cobalt Strike Like Tool That Turns Chrome into C2 Platform
09
Aug
2025

A Cobalt Strike Like Tool That Turns Chrome into C2 Platform

At DEF CON 33, security researcher Mike Weber of Praetorian Security unveiled ChromeAlone — a Chromium-based browser Command & Control…

CastleBot MaaS Unleashes Diverse Payloads in Coordinated Ransomware Attacks
09
Aug
2025

CastleBot MaaS Unleashes Diverse Payloads in Coordinated Ransomware Attacks

IBM X-Force has uncovered CastleBot, a nascent malware framework operating as a Malware-as-a-Service (MaaS) platform, enabling cybercriminals to deploy a…

Typosquatted PyPI Packages Used by Threat Actors to Steal Cryptocurrency from Bittensor Wallets
08
Aug
2025

Typosquatted PyPI Packages Used by Threat Actors to Steal Cryptocurrency from Bittensor Wallets

GitLab’s Vulnerability Research team has uncovered a highly sophisticated cryptocurrency theft campaign exploiting typosquatted Python packages on the Python Package…

Efimer Malicious Script Spreads via WordPress Sites, Torrents, and Email in Massive Attack Wave
08
Aug
2025

Efimer Malicious Script Spreads via WordPress Sites, Torrents, and Email in Massive Attack Wave

Kaspersky researchers have uncovered a widespread campaign involving the Efimer malicious script, a sophisticated Trojan-dropper primarily aimed at stealing cryptocurrency….

Over 5,000 Fake Online Pharmacies Caught Selling Counterfeit Medicines
08
Aug
2025

Over 5,000 Fake Online Pharmacies Caught Selling Counterfeit Medicines

Researchers at Gen have uncovered a vast network of over 5,000 fraudulent online pharmacy domains operated by a single cybercriminal…