Category: GBHackers

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process
23
Oct
2025

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process

Atlassian has disclosed a critical path traversal vulnerability affecting Jira Software Data Center and Server that could allow authenticated attackers…

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion
23
Oct
2025

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion

Cybersecurity researchers at Wordfence Threat Intelligence and their Care and Response teams have observed a persistent trend in new malware…

Global SMS Phishing Campaign Traced to China Targets Users Worldwide
23
Oct
2025

Global SMS Phishing Campaign Traced to China Targets Users Worldwide

A sophisticated and widespread smishing campaign originating from China has emerged as a significant threat to users worldwide. Researchers have…

Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography
23
Oct
2025

Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Cybersecurity researchers at Arctic Wolf Labs have uncovered a cunning new threat dubbed Caminho, a Brazilian Loader-as-a-Service (LaaS) that’s turning…

Vulnerability in Perplexity’s Comet Browser Screenshot Feature Allows Malicious Prompt Injection
23
Oct
2025

Vulnerability in Perplexity’s Comet Browser Screenshot Feature Allows Malicious Prompt Injection

Researchers have discovered a critical security vulnerability in Perplexity’s Comet AI browser that allows attackers to inject malicious commands through…

Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers
23
Oct
2025

Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers

Scammers have intensified their efforts to defraud vulnerable populations through sophisticated impersonation schemes and fraudulent financial aid offers, according to…

Active Exploits Target Magento and Adobe Commerce RCE, Attackers Inject Webshells
23
Oct
2025

Active Exploits Target Magento and Adobe Commerce RCE, Attackers Inject Webshells

Unauthenticated attackers are actively exploiting a critical vulnerability affecting Adobe Commerce and Magento platforms worldwide. The flaw, tracked as CVE-2025-54236…

Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams
23
Oct
2025

Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams

Cybersecurity researchers have uncovered a sophisticated campaign targeting global retail and consumer services organizations through credential theft and gift card…

Warlock Ransomware Exploits SharePoint ToolShell Zero-Day in New Attack Campaign
23
Oct
2025

Warlock Ransomware Exploits SharePoint ToolShell Zero-Day in New Attack Campaign

Chinese-linked threat actors behind the Warlock ransomware operation have emerged as a significant cybersecurity concern following their exploitation of a…

New Python-Based RAT Disguised as Minecraft App Steals Sensitive User Data
23
Oct
2025

New Python-Based RAT Disguised as Minecraft App Steals Sensitive User Data

Threat researchers at Netskope have uncovered a sophisticated new Remote Access Trojan (RAT) written in Python that masquerades as “Nursultan…

TARmageddon Security Flaw in Rust Library Could Lead to Config Tampering and RCE
23
Oct
2025

TARmageddon Security Flaw in Rust Library Could Lead to Config Tampering and RCE

The Edera security team has discovered a critical vulnerability in the async-tar Rust library and its descendants, including the widely-used…

BIND 9 Vulnerabilities Expose DNS Servers to Cache Poisoning and DoS
23
Oct
2025

BIND 9 Vulnerabilities Expose DNS Servers to Cache Poisoning and DoS

The Internet Systems Consortium (ISC) has disclosed three critical vulnerabilities in BIND 9, the most widely deployed DNS software globally….