Category: GBHackers

Threat Actors Exploit MCP Servers to Steal Sensitive Data
16
Sep
2025

Threat Actors Exploit MCP Servers to Steal Sensitive Data

Unvetted Model Context Protocol (MCP) servers introduce a stealthy supply chain attack vector, enabling adversaries to harvest credentials, configuration files,…

Spring Framework Security Flaws Allow Authorization Bypass and Annotation Detection Issues
16
Sep
2025

Spring Framework Security Flaws Allow Authorization Bypass and Annotation Detection Issues

A pair of medium-severity vulnerabilities in the Spring Framework and Spring Security libraries were disclosed on September 15, 2025. Both…

New Phoenix Rowhammer Attack Bypasses DDR5 Chip Protections
16
Sep
2025

New Phoenix Rowhammer Attack Bypasses DDR5 Chip Protections

A new variation of the Rowhammer attack, named Phoenix, breaks through the built-in defenses of modern DDR5 memory modules. Researchers reverse-engineered…

AISURU Botnet Fuels Record-Breaking 11.5 Tbps DDoS Attack With 300,000 Hijacked Routers
16
Sep
2025

AISURU Botnet Fuels Record-Breaking 11.5 Tbps DDoS Attack With 300,000 Hijacked Routers

The newly identified AISURU botnet, leveraging an estimated 300,000 compromised routers worldwide, has been pinpointed as the force behind a…

Apple Releases Security Update Patching Multiple Vulnerabilities in iOS 26 and iPadOS 26
16
Sep
2025

Apple Releases Security Update Patching Multiple Vulnerabilities in iOS 26 and iPadOS 26

Apple has released a comprehensive security update for iOS 26 and iPadOS 26, addressing 27 vulnerabilities across multiple system components. The update,…

Microsoft Resolves Bluetooth Audio Problem in Windows 11 24H2 Update
16
Sep
2025

Microsoft Resolves Bluetooth Audio Problem in Windows 11 24H2 Update

Microsoft has addressed a widespread audio issue affecting Bluetooth speakers, headsets, and integrated laptop speakers in Windows 11 version 24H2….

Advanced AI Tool for Identifying and Mitigating Security Flaws
15
Sep
2025

Advanced AI Tool for Identifying and Mitigating Security Flaws

Red AI Range (RAR) offers a turnkey platform for AI red teaming and vulnerability assessment, enabling security professionals to simulate…

Phishing Campaigns Exploit RMM Tools to Sustain Remote Access
15
Sep
2025

Phishing Campaigns Exploit RMM Tools to Sustain Remote Access

A sophisticated phishing operation in which attackers deploy remote monitoring and management (RMM) tools—ITarian (formerly Comodo), PDQ Connect, SimpleHelp, and…

Sidewinder Hackers Weaponize Nepal Protests to Spread Cross-Platform Malware
15
Sep
2025

Sidewinder Hackers Weaponize Nepal Protests to Spread Cross-Platform Malware

Sidewinder, a well-known advanced persistent threat (APT) group, has adapted its tactics to exploit the ongoing protests in Nepal, deploying…

Pro-Russian Hackers Target Critical Industries Across the Globe
15
Sep
2025

Pro-Russian Hackers Target Critical Industries Across the Globe

In 2024, as the Russia-Ukraine war prolongs and military and economic cooperation between North Korea and Russia deepens, cyberspace has…

Burger King Uses DMCA to Remove Blog Exposing Drive-Thru System Security Flaws
15
Sep
2025

Burger King Uses DMCA to Remove Blog Exposing Drive-Thru System Security Flaws

Burger King has invoked the Digital Millennium Copyright Act to force the removal of a security researcher’s blog post that…

IBM QRadar SIEM Vulnerability Allows Unauthorized Actions by Attackers
15
Sep
2025

IBM QRadar SIEM Vulnerability Allows Unauthorized Actions by Attackers

A permissions issue in IBM QRadar SIEM could enable local privileged users to modify configuration files without proper authorization. Tracked…