Reading view

There are new articles available, click to refresh the page.

LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks

A new security analysis has unveiled “LOLPROX,” a comprehensive catalog of “Living Off The Land” (LOL) techniques specifically targeting Proxmox Virtual Environment (VE). The research, detailed by security researcher Andy Gill (ZephrSec), highlights how threat actors can weaponize the popular open-source hypervisor’s native tools to execute stealthy, deep-persistence attacks that bypass traditional network monitoring and […]

The post LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation

By: Divya

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a high-severity vulnerability affecting Meta’s React Server Components to its Known Exploited Vulnerabilities (KEV) catalog. Assigned the identifier CVE-2025-55182, the security flaw dubbed “React2Shell” by the security community is currently being exploited in the wild, prompting urgent calls for remediation. React2Shell is a Remote Code Execution […]

The post CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Porsche Cars Disabled After Major Failure in Installed Satellite Security System

By: Divya

Hundreds of Porsche owners across Russia are facing a significant problem as their luxury cars have suddenly stopped working. The issue stems from a failure in the factory-installed security and tracking systems, which have completely shut down the vehicles. According to reports from the Rolf dealership network, the largest Porsche service provider in Russia, the […]

The post Porsche Cars Disabled After Major Failure in Installed Satellite Security System appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Next.js Releases Scanner to Detect and Fix Apps Affected by React2Shell Vulnerability

By: Divya

Next.js developers have a new weapon in the fight against the critical “React2Shell” vulnerability. This new scanner offers a simple, one-line solution for development teams to identify vulnerable versions of Next.js and React Server Components (RSC) and apply the necessary security updates instantly. Vercel Labs has released a dedicated command-line tool, fix-react2shell-next, designed to automatically detect […]

The post Next.js Releases Scanner to Detect and Fix Apps Affected by React2Shell Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Target Developers Using Malicious VS Code and Cursor AI Extensions

Visual Studio Code and AI-powered IDEs such as Cursor AI and Windsurf are emerging as one of the most critical and overlooked attack surfaces in the modern software supply chain. Installed on millions of developer machines worldwide, these tools often run with access to source code, secrets, and production credentials. New research shows that compromising […]

The post Hackers Target Developers Using Malicious VS Code and Cursor AI Extensions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

OceanLotus Targets Xinchuang Ecosystem with Sophisticated Supply Chain Attacks

The advanced persistent threat (APT) group known as OceanLotus (APT32) has been observed launching a sophisticated cyberespionage campaign specifically targeting China’s “Xinchuang” initiative the nation’s strategic push to replace foreign technology with indigenized, secure IT ecosystems. In a notable shift from traditional Windows-centric attacks, OceanLotus is now deploying specialized weaponry designed to compromise domestic Linux-based […]

The post OceanLotus Targets Xinchuang Ecosystem with Sophisticated Supply Chain Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

WatchGuard Firebox Vulnerabilities Let Hackers Skip Integrity Validation and Plant Malicious Code

By: Divya

WatchGuard Technologies has disclosed critical security vulnerabilities affecting its Firebox firewall products that could allow attackers to bypass system integrity checks and execute malicious code. The company released patches on December 4, 2025, addressing six distinct vulnerabilities that pose significant risks to enterprise network security. Multiple WatchGuard Firebox Vulnerabilities One of the most concerning flaws […]

The post WatchGuard Firebox Vulnerabilities Let Hackers Skip Integrity Validation and Plant Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Indonesia’s Gambling Industry Reveals Clues of Nationwide Cyber Involvement

A massive Indonesian-speaking cybercrime operation spanning over 14 years has been uncovered, revealing a sophisticated infrastructure that shows hallmarks of state-level backing and resources typically associated with advanced persistent threat actors. Security researchers at Malanta have exposed what may be one of the largest and most complex Indonesian-speaking cyber operations ever documented a sprawling ecosystem […]

The post Indonesia’s Gambling Industry Reveals Clues of Nationwide Cyber Involvement appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes

By: Divya

Cal.com has disclosed a critical authentication bypass vulnerability that could allow attackers to gain unauthorized access to user accounts by exploiting a flaw in password verification logic. The flaw, tracked as CVE-2025-66489 and assigned a critical CVSS v4 score of 9.3, affects all versions of Cal.com up to and including 5.9.7. Users are urged to […]

The post Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Shanya EDR Killer: The New Favorite Tool for Ransomware Operators

A sophisticated new “packer-as-a-service” tool known as Shanya has emerged in the cybercriminal underground, rapidly becoming a preferred weapon for major ransomware groups looking to neutralize endpoint defenses. According to new research from Sophos, Shanya is an evolution in the “EDR killer” market, effectively succeeding previous tools like HeartCrypt. The malware is designed to blind […]

The post Shanya EDR Killer: The New Favorite Tool for Ransomware Operators appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Critical React2Shell RCE Flaw Actively Exploited to Run Malicious Code

By: Divya

A critical remote code execution vulnerability in React Server Components has emerged as an active exploitation target, with security researchers observing widespread automated attacks across the internet. The flaw, tracked as CVE-2025-55182 and dubbed “React2Shell,” affects React and downstream ecosystems, including the popular Next.js framework, prompting urgent calls for immediate patching. CVE ID Vulnerability CVSS Score Severity […]

The post Critical React2Shell RCE Flaw Actively Exploited to Run Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Critical Vulnerabilities Found in GitHub Copilot, Gemini CLI, Claude, and Other AI Tools Affect Millions

A groundbreaking security research project has uncovered a new class of vulnerabilities affecting virtually every major AI-powered integrated development environment (IDE) and coding assistant on the market. Dubbed “IDEsaster,” this attack chain exploits fundamental features of underlying IDE platforms to exfiltrate data and execute remote code, impacting millions of developers worldwide. The research, conducted over […]

The post Critical Vulnerabilities Found in GitHub Copilot, Gemini CLI, Claude, and Other AI Tools Affect Millions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

LockBit 5.0 Infrastructure Exposed as Hackers Leak Critical Server Data

By: Divya

Security researchers have uncovered critical infrastructure details for the notorious LockBit 5.0 ransomware operation, including the IP address 205.185.116.233 and the domain karma0.xyz, which hosts the group’s latest leak site. The discovery represents a significant operational security failure for the cybercriminal organization. Cybersecurity researcher Rakesh Krishnan first publicized the findings on December 5, 2025, identifying […]

The post LockBit 5.0 Infrastructure Exposed as Hackers Leak Critical Server Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data

By: Divya

A hidden danger has been lurking in the Go programming ecosystem for over four years. Security researchers from the Socket Threat Research Team have discovered two malicious software packages that impersonate popular Google tools. These fake packages, designed to trick busy developers, have been quietly stealing data since May 2021. The malicious packages are identified […]

The post Malicious Go Packages Impersonate Google’s UUID Library to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Barts Health NHS Reveals Data Breach Linked to Oracle Zero-Day Exploited by Clop Ransomware

By: Divya

Barts Health NHS Trust has disclosed a significant data breach affecting patient and staff information after the Cl0p ransomware gang exploited a critical vulnerability in Oracle E-Business Suite software. The criminal syndicate stole files from an invoice database. It published them on the dark web, compromising the personal data of individuals who received treatment or […]

The post Barts Health NHS Reveals Data Breach Linked to Oracle Zero-Day Exploited by Clop Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

2.15M Next.js Web Services Exposed Online, Active Attacks Reported – Update Immediately

By: Divya

Security teams worldwide are rushing to patch systems after the disclosure of a critical React vulnerability, CVE-2025-55182, widely known as “React2Shell.” The flaw affects React Server Components (RSC) and has a maximum CVSS score of 10, the highest possible rating, signaling critical impact and ease of exploitation. Censys telemetry shows that more than 2.15 million internet‑facing services are […]

The post 2.15M Next.js Web Services Exposed Online, Active Attacks Reported – Update Immediately appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

FvncBot Android Malware Steals Keystrokes and Injects Harmful Payloads

By: Divya

A newly discovered Android banking trojan, FvncBot, has emerged as a sophisticated threat targeting mobile banking users in Poland. Researchers from Intel 471 first identified this malware on November 25, 2025, disguised as a security application from mBank, one of Poland’s most prominent banking institutions.​ Novel Malware with Advanced Capabilities FvncBot represents an entirely new […]

The post FvncBot Android Malware Steals Keystrokes and Injects Harmful Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing

Madison, United States, December 5th, 2025, CyberNewsWire Sprocket Security is proud to announce that it has once again been recognized by G2 for “High Performer,” “Best Support,” and “Easiest to Do Business With” in the Winter 2025 Relationship Index for Penetration Testing. This marks the second consecutive quarter Sprocket has earned these honors, reinforcing the […]

The post Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Criminal IP to Host Webinar: Beyond CVEs – From Visibility to Action with ASM

Torrance, California, USA, December 5th, 2025, CyberNewsWire Criminal IP will host a live webinar on December 16 at 11:00 AM Pacific Time (PT), focusing on the shift in cyberattack strategies. The session will examine how an increasing number of incidents now originate from exposed digital assets, rather than from known software vulnerabilities. As organizations rapidly […]

The post Criminal IP to Host Webinar: Beyond CVEs – From Visibility to Action with ASM appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Avast Antivirus Sandbox Vulnerabilities Allow Privilege Escalation

By: Divya

SAFA researchers uncovered four kernel heap overflow vulnerabilities in Avast Antivirus’s aswSnx.sys driver, designated CVE-2025-13032, affecting versions before 25.3 on Windows. These flaws originate from double-fetch issues in IOCTL handling, allow local attackers to trigger pool overflows for privilege escalation to SYSTEM. The vulnerabilities require sandbox manipulation to access the attack surface, marking a reversal […]

The post Avast Antivirus Sandbox Vulnerabilities Allow Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

❌