Aggregator
Chinese Hackers Exploit SAP RCE Vulnerability to Deploy Supershell Backdoors
A critical remote code execution (RCE) vulnerability, identified as CVE-2025-31324, in SAP NetWeaver Visual Composer 7.x is being actively exploited by a Chinese threat actor, tracked as Chaya_004. This deserialization flaw allows attackers to upload malicious binaries, including web shells, to unpatched servers, granting full system takeover capabilities. According to research from Forescout, exploitation has […]
The post Chinese Hackers Exploit SAP RCE Vulnerability to Deploy Supershell Backdoors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
2025 Threat Detection Report: HijackLoader | Red Canary
CVE-2025-4309 | PHPGurukul Art Gallery Management System 1.1 /admin/add-art-type.php arttype sql injection
CVE-2025-4358 | PHPGurukul Company Visitor Management System 2.0 /admin-profile.php adminname sql injection
CVE-2025-4242 | PHPGurukul Online Birth Certificate System 2.0 between-dates-report.php fromdate sql injection
Hackers Target IT Admins by Poisoning SEO to Push Malware to Top Search Results
Cybercriminals are increasingly targeting IT administrators through sophisticated Search Engine Optimization (SEO) poisoning techniques. By leveraging SEO tactics typically used for legitimate online marketing, attackers manipulate search engine rankings to push malicious websites to the top of results on platforms like Google. Disguised as trusted tools, these malicious payloads trick even seasoned admins into downloading […]
The post Hackers Target IT Admins by Poisoning SEO to Push Malware to Top Search Results appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Fake AI platforms deliver malware diguised as video content
A clever malware campaign delivering the novel Noodlophile malware is targeting creators and small businesses looking to enhance their productivity with AI tools. But, in an unusual twist, the threat actors are not disguising the malware as legitimate software, but as content / output created by a legitimate-looking AI tool. AI as a social engineering lure “As AI surges into mainstream adoption, millions of users turn daily to AI-powered tools for content creation,” Morphisec security … More →
The post Fake AI platforms deliver malware diguised as video content appeared first on Help Net Security.
New Mamona Ransomware Targets Windows Systems Using Abused Ping Command
Cybersecurity researchers are raising the alarm about a newly discovered commodity ransomware strain dubbed Mamona, which is rapidly spreading across Windows systems. Unlike traditional ransomware, Mamona employs a unique set of tactics, notably exploiting the humble Windows “ping” command as a timing mechanism, and operates entirely offline, making detection and response more difficult. Emerging on the […]
The post New Mamona Ransomware Targets Windows Systems Using Abused Ping Command appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Malicious Python Package Impersonates Discord Developers to Deploy Remote Commands
A seemingly innocuous Python package named ‘discordpydebug’ surfaced on the Python Package Index (PyPI) under the guise of “Discord py error logger.” Marketed as a debugging utility for developers working on Discord bots with the Discord.py library, this package was anything but harmless. Beneath its benign facade lay a fully functional remote access trojan (RAT), […]
The post Malicious Python Package Impersonates Discord Developers to Deploy Remote Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads
An advanced supply chain attack has targeted the well-known npm package rand-user-agent, which receives about 45,000 downloads every week, in a worrying development for the JavaScript developer community. Maintained by WebScrapingAPI, this package is designed to generate randomized, real-world user-agent strings based on their frequency of occurrence. However, recent analysis has uncovered malicious code embedded […]
The post New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.