GBhackers

Multiple Vulnerabilities in GitLab Patched, Blocking DoS and SSRF Attack Vectors

GitLab has released critical security updates across multiple versions to address six significant vulnerabilities that could enable denial-of-service attacks, server-side request forgery, and information disclosure.
September 2, 2025

Lazarus Hackers Exploit 0-Day to Deploy Three Remote Access Trojans

Lazarus hackers exploited a zero-day vulnerability to deploy three custom RATs targeting financial and cryptocurrency firms. The attack chain included social engineering, exploitation, discovery, and next-stage deployment.

MobSF Vulnerability Allows Attackers to Upload Malicious Files

Critical security flaws discovered in Mobile Security Framework version 4.4.0 enable authenticated attackers to exploit path traversal and arbitrary file write vulnerabilities, potentially compromising system integrity and exposing sensitive data.

New WhatsApp Scam Poses Serious Risk: Hackers Can Hijack Your Chats

Users of the popular messaging app WhatsApp are being targeted by a new, highly deceptive scam that grants attackers full access to victims’ contacts, chat history, and media files.

Xerox FreeFlow Flaws Enable SSRF and Remote Code Execution

Xerox has released critical patches for FreeFlow Core version 8.0.4 to address two high-severity vulnerabilities—CVE-2025-8355 and CVE-2025-8356—that enable Server-Side Request Forgery (SSRF) and Remote Code Execution (RCE).

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware

UAC-0099, a threat actor group, is actively targeting Ukrainian defense and government entities using a sophisticated malware delivery chain. The campaign leverages phishing emails with double-archived HTA files to deploy the MATCHBOIL loader.

Hackers Use Weaponized .HTA Files to Infect Victims with Red Ransomware

Hackers are using weaponized .HTA files to deploy the Epsilon Red ransomware, leveraging ActiveX and Windows Command Shell for stealthy payload delivery. The malware employs social engineering tactics.

New Gunra Ransomware Targets Windows Systems, Encrypts Files, and Erases Shadow Copies

Gunra ransomware, active since April 2025, targets Windows systems and uses advanced tactics, including rapid file encryption and shadow copy deletion, to maximize impact. The ransomware shows similarities to Conti ransomware.

New VoIP Botnet Targets Routers Using Default Passwords

A newly discovered botnet campaign is exploiting VoIP-enabled routers by leveraging default password attacks over Telnet. Initially detected in a small New Mexico community, the operation has since expanded globally, compromising over 500 devices.

Tridium Niagara Framework Flaws Expose Sensitive Network Data

Researchers uncovered 13 critical vulnerabilities in the Niagara Framework, developed by Tridium. These flaws, consolidated into 10 CVEs, affect building management, industrial automation, and smart infrastructure systems globally.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags