Category: GBHackers

CrowdStrike Alerts on Oracle E-Business Suite 0-Day Under Mass Exploitation
07
Oct
2025

CrowdStrike Alerts on Oracle E-Business Suite 0-Day Under Mass Exploitation

A novel zero-day vulnerability in Oracle E-Business Suite (CVE-2025-61882) is being actively exploited in a large-scale data exfiltration campaign, with…

Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day
07
Oct
2025

Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day

The notorious Cl0p ransomware group has been actively exploiting a critical zero-day vulnerability in Oracle’s E-Business Suite (EBS), targeting enterprise customers through…

Hackers Exploit Legitimate Commands to Breach Databases
07
Oct
2025

Hackers Exploit Legitimate Commands to Breach Databases

In recent years, adversaries have abandoned traditional malware in favor of “living-off-the-land” operations against cloud and SaaS environments. Rather than…

OpenSSH ProxyCommand Flaw Allows Remote Code Execution
07
Oct
2025

OpenSSH ProxyCommand Flaw Allows Remote Code Execution

Security researchers have uncovered a critical flaw in OpenSSH’s ProxyCommand feature that can be leveraged to achieve remote code execution…

CISA Issues Alert on Active Exploitation of Microsoft Windows Privilege Escalation Flaw
07
Oct
2025

CISA Issues Alert on Active Exploitation of Microsoft Windows Privilege Escalation Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a critical privilege escalation vulnerability in Microsoft…

GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware
07
Oct
2025

GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware

A critical zero-day vulnerability in GoAnywhere MFT’s License Servlet is being actively exploited to deploy Medusa ransomware. On September 18,…

Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances
07
Oct
2025

Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances

The hacker collective styling itself “Scattered Lapsus$ Hunters”—an alliance echoing elements of ShinyHunters, Scattered Spider, and Lapsus$—has launched an extortionware…

Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware
07
Oct
2025

Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware

The sophisticated China-linked threat actor Mustang Panda has refined its cyber espionage arsenal with an advanced DLL side-loading technique specifically targeting the…

NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability
07
Oct
2025

NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability

The UK National Cyber Security Centre (NCSC) has issued a security alert following confirmation of active exploitation of a critical…

A Scalable Solution for Global Privileged Access Management
06
Oct
2025

A Scalable Solution for Global Privileged Access Management

Reemo continues its mission to secure enterprise remote access and becomes the first French cybersecurity provider to protect all remote…

Technical Details and Exploit Released for Chrome Remote Code Execution Flaw
06
Oct
2025

Technical Details and Exploit Released for Chrome Remote Code Execution Flaw

A remote code execution vulnerability affecting Google Chrome’s WebAssembly engine has been publicly disclosed, along with a fully functional exploit….

Zabbix Agent/Agent2 for Windows Vulnerability Could Allow Privilege Escalation
06
Oct
2025

Zabbix Agent/Agent2 for Windows Vulnerability Could Allow Privilege Escalation

A security flaw in Zabbix Agent and Agent2 for Windows has been discovered that could allow a local attacker to…