Category: GBHackers

Axis Camera Server Vulnerabilities Expose Thousands of Organizations to Attack
08
Aug
2025

Axis Camera Server Vulnerabilities Expose Thousands of Organizations to Attack

Claroty’s Team82 research unit has unveiled four vulnerabilities affecting Axis Communications’ widely deployed video surveillance ecosystem, potentially endangering thousands of…

PyPI Issues Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers
08
Aug
2025

PyPI Issues Advisory to Prevent ZIP Parser Confusion Attacks on Python Package Installers

The Python Package Index (PyPI) has announced new restrictions aimed at mitigating ZIP parser confusion attacks that could exploit discrepancies…

Windows UAC Bypass Exploits Character Map Tool for Privilege Escalation
08
Aug
2025

Windows UAC Bypass Exploits Character Map Tool for Privilege Escalation

Cybersecurity researchers have uncovered a new technique that allows attackers to bypass Windows User Account Control (UAC) protections by exploiting…

Multiple Security vulnerabilities Found in WWBN AVideo, MedDream, and Eclipse ThreadX
08
Aug
2025

Multiple Security vulnerabilities Found in WWBN AVideo, MedDream, and Eclipse ThreadX

Cisco Talos’ Vulnerability Discovery & Research team has disclosed a total of 12 critical security vulnerabilities across three popular software…

VexTrio TDS Deploys Malicious VPN Apps on Google Play and App Store
08
Aug
2025

VexTrio TDS Deploys Malicious VPN Apps on Google Play and App Store

VexTrio, a sophisticated threat actor known for operating a massive traffic distribution system (TDS), has expanded its malicious activities by…

Columbia University Data Breach Exposes Personal and Financial Data of 870,000
08
Aug
2025

Columbia University Data Breach Exposes Personal and Financial Data of 870,000

Columbia University disclosed a significant cybersecurity incident that compromised personal and financial information of nearly 870,000 individuals, making it one…

Record-Breaking GreedyBear Attack Uses 650 Hacking Tools to Steal $1M from Victims
08
Aug
2025

Record-Breaking GreedyBear Attack Uses 650 Hacking Tools to Steal $1M from Victims

The threat actor group dubbed GreedyBear has orchestrated an industrial-scale operation blending malicious browser extensions, executable malware, and phishing infrastructure…

ChatGPT-5 Launches – Discover What’s New in the Next-Gen AI Agent
08
Aug
2025

ChatGPT-5 Launches – Discover What’s New in the Next-Gen AI Agent

OpenAI has officially launched ChatGPT-5, marking a significant leap forward in artificial intelligence technology with a revolutionary unified system that…

CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits
08
Aug
2025

CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released ten industrial control systems (ICS) advisories on August 7, 2025, highlighting…

Amazon ECS Internal Protocol Exploited to Steal AWS Credentials from Other Tasks
08
Aug
2025

Amazon ECS Internal Protocol Exploited to Steal AWS Credentials from Other Tasks

Security researchers have disclosed a critical vulnerability in Amazon Elastic Container Service (ECS) that allows malicious containers to steal AWS…

US Confirms Takedown of BlackSuit Ransomware Behind 450+ Hacks
08
Aug
2025

US Confirms Takedown of BlackSuit Ransomware Behind 450+ Hacks

Federal law enforcement agencies have successfully dismantled the critical infrastructure of BlackSuit ransomware, a sophisticated cybercriminal operation that has compromised…

Malicious Go Packages Used by Threat Actors to Deploy Obfuscated Remote Payloads
08
Aug
2025

Malicious Go Packages Used by Threat Actors to Deploy Obfuscated Remote Payloads

Socket’s Threat Research Team has identified eleven malicious Go packages distributed via GitHub, with ten remaining active on the Go…