Category: GBHackers

Critical PostgreSQL Flaws Allow Code Injection During Restoration
18
Aug
2025

Critical PostgreSQL Flaws Allow Code Injection During Restoration

The PostgreSQL Global Development Group released emergency security updates on August 14, 2025, addressing three critical vulnerabilities that enable code…

Elastic EDR 0-Day Flaw Lets Hackers Evade Detection, Run Malware, and Trigger BSOD
17
Aug
2025

Elastic EDR 0-Day Flaw Lets Hackers Evade Detection, Run Malware, and Trigger BSOD

AshES Cybersecurity has disclosed a severe zero-day vulnerability in Elastic’s Endpoint Detection and Response (EDR) software that transforms the security…

PoC Released for Fortinet FortiSIEM Command Injection Flaw
16
Aug
2025

PoC Released for Fortinet FortiSIEM Command Injection Flaw

Security researchers have uncovered a severe pre-authentication command injection vulnerability in Fortinet’s FortiSIEM platform that allows attackers to completely compromise…

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages
16
Aug
2025

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages

A sophisticated phishing campaign targeting the maintainer of eslint-config-prettier, a widely-used npm package with over 3.5 billion downloads, resulted in…

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks
16
Aug
2025

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks

Cisco Talos researchers have uncovered a sophisticated Chinese-speaking advanced persistent threat (APT) group, designated UAT-7237, that has been actively targeting…

Cisco IOS, IOS XE, and Secure Firewall Flaws Allow Remote DoS Attacks
15
Aug
2025

Cisco IOS, IOS XE, and Secure Firewall Flaws Allow Remote DoS Attacks

Cisco Systems has issued a high-priority security advisory addressing multiple critical vulnerabilities in the Internet Key Exchange Version 2 (IKEv2)…

F5 Fixes HTTP/2 Flaw Affecting Multiple Products in Massive DoS Attacks
15
Aug
2025

F5 Fixes HTTP/2 Flaw Affecting Multiple Products in Massive DoS Attacks

F5 Networks has disclosed a new HTTP/2 vulnerability affecting multiple BIG-IP products that could allow attackers to launch denial-of-service attacks…

ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
15
Aug
2025

ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows

The popular open-source image manipulation software ImageMagick has addressed four critical security vulnerabilities discovered by Google’s artificial intelligence-powered security research…

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash
15
Aug
2025

Phishing Campaign Exploits Japanese Character “ん” to Imitate Forward Slash

Security researchers have uncovered a sophisticated new phishing campaign that exploits the Japanese hiragana character “ん” to create deceptively authentic-looking…

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password
15
Aug
2025

Source Code of ERMAC V3.0 Malware Exposed by ‘changemeplease’ Password

A significant security breach has exposed the complete source code of ERMAC V3.0, a sophisticated banking trojan that targets over…

Palo Alto GlobalProtect Vulnerability Allows Privilege Escalation via Certificate Bypass
15
Aug
2025

Palo Alto GlobalProtect Vulnerability Allows Privilege Escalation via Certificate Bypass

A newly disclosed vulnerability in Palo Alto Networks’ GlobalProtect application could allow attackers to escalate privileges and install malicious software…

VirtualBox 7.2 Adds Windows 11/Arm VM Support and Key Bug Fixes
15
Aug
2025

VirtualBox 7.2 Adds Windows 11/Arm VM Support and Key Bug Fixes

Oracle has released VirtualBox 7.2.0, a major update that significantly expands ARM virtualization capabilities and introduces comprehensive Windows 11/ARM support….