Category: GBHackers

CISA Issues Alert on Samsung 0-Day RCE Flaw Actively Exploited in Attacks
11
Nov
2025

CISA Issues Alert on Samsung 0-Day RCE Flaw Actively Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical remote code execution vulnerability affecting Samsung mobile devices to…

Lazarus Group Deploys Weaponized Documents Against Aerospace & Defense
11
Nov
2025

Lazarus Group Deploys Weaponized Documents Against Aerospace & Defense

Security researchers at ENKI have uncovered a sophisticated espionage campaign targeting aerospace and defense organizations, in which the Lazarus Group…

Hackers Exploit Triofox 0-Day to Deploy Malicious Payloads Using Anti-Virus Feature
11
Nov
2025

Hackers Exploit Triofox 0-Day to Deploy Malicious Payloads Using Anti-Virus Feature

Cybersecurity researchers from Mandiant Threat Defense have uncovered a critical zero-day vulnerability in Gladinet’s Triofox file-sharing platform that allowed attackers…

MAD-CAT “Meow” Tool Sparks Real-World Data Corruption Attacks
10
Nov
2025

MAD-CAT “Meow” Tool Sparks Real-World Data Corruption Attacks

The infamous Meow attack, which devastated unsecured databases since 2020, has resurfaced with renewed force through MAD-CAT (Meow Attack Data Corruption Automation…

Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America
10
Nov
2025

Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America

Menlo Park, CA, USA, November 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud-Native Application Protection Platforms (CNAPP), announced…

Android Users Hit by Malware Disguised as Relaxation Programs
10
Nov
2025

Android Users Hit by Malware Disguised as Relaxation Programs

A sophisticated new cyberattack targeting Android devices in South Korea has been uncovered, leveraging Google’s asset-tracking feature, Find Hub, to…

NuGet Supply-Chain Exploit Uses Timed Destructive Payloads Against ICS
10
Nov
2025

NuGet Supply-Chain Exploit Uses Timed Destructive Payloads Against ICS

A sophisticated supply chain attack has compromised critical industrial control systems through nine malicious NuGet packages designed to inject time-delayed…

Popular npm Library Used in AI and NLP Projects Exposes Systems to RCE
10
Nov
2025

Popular npm Library Used in AI and NLP Projects Exposes Systems to RCE

A critical remote code execution vulnerability has been discovered in the widely used JavaScript library expr-eval, affecting thousands of projects…

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses
10
Nov
2025

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses

Threat actors are systematically compromising Outlook and Google mailboxes with alarming success, leveraging sophisticated techniques that sidestep traditional email defenses…

LangGraph Deserialization Flaw Enables Execution of Malicious Python Code
10
Nov
2025

LangGraph Deserialization Flaw Enables Execution of Malicious Python Code

A critical remote code execution vulnerability has been discovered in LangGraph’s checkpoint serialization library, affecting versions before 3.0. The flaw…

HackGPT Launches as AI-Driven Penetration Testing Suite Using GPT-4 and Other Models
10
Nov
2025

HackGPT Launches as AI-Driven Penetration Testing Suite Using GPT-4 and Other Models

HackGPT Enterprise has officially launched as a production-ready, cloud-native AI-powered penetration testing platform designed specifically for enterprise security teams. Created…

Ransomware Operators Exploit RMM Tools to Deploy Medusa and DragonForce
10
Nov
2025

Ransomware Operators Exploit RMM Tools to Deploy Medusa and DragonForce

Cybersecurity researchers at Zensec have exposed a sophisticated supply-chain attack campaign that weaponised trusted Remote Monitoring and Management (RMM) infrastructure…