GBHackers on Security
Cyber Security News
Threat Actors Selling Nunu Stealer On Hacker Forums
A new malware variant called Nunu Stealer is making headlines after being advertised on underground hacker forums and Telegram channels.Priced at $100 per month, this malicious...
CVE/vulnerability
Siemens UMC Vulnerability Allows Arbitrary Remote Code Execution
A critical vulnerability has been identified in Siemens' User Management Component (UMC), which could allow unauthenticated remote attackers to execute arbitrary code.The flaw,...
Cyber Security News
Foxit PDF Editor Vulnerabilities Allows Remote Code Execution
Foxit Software has issued critical security updates for its widely used PDF solutions, Foxit PDF Reader and Foxit PDF Editor.The updates—Foxit PDF Reader 2024.4...
Cyber Security News
Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access
Microsoft has swiftly addressed a critical security vulnerability affecting Windows 11 (version 23H2), which could allow local attackers to escalate privileges to the SYSTEM...
Cyber Security News
NetWalker Ransomware Operator Sentenced to 20 Years in Prison
A Romanian man has been sentenced to 20 years in prison for his involvement in the notorious NetWalker ransomware attacks.The sentencing, which took...
CVE/vulnerability
CISA Warns of BeyondTrust Privileged Remote Access Exploited in Wild
The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical vulnerability impacting BeyondTrust’s Privileged Remote Access (PRA) and Remote Support...
Cyber Security News
CISA Releases Eight New ICS Advisories to Defend Cyber Attacks
The Cybersecurity and Infrastructure Security Agency (CISA) has issued eight detailed advisories on vulnerabilities affecting Industrial Control Systems (ICS).These vulnerabilities impact critical software and...
Cyber Security News
NotLockBit – Previously Unknown Ransomware Attack Windows & macOS
A new and advanced ransomware family, dubbed NotLockBit, has emerged as a significant threat in the cybersecurity landscape, closely mimicking the behavior and tactics...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.