Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Critical PostgreSQL Flaws Allow Code Injection During Restoration

The PostgreSQL Global Development Group released emergency security updates on August 14, 2025, addressing three critical vulnerabilities that enable code injection attacks during database restoration processes. The flaws affect all supported versions from PostgreSQL 13 through 17, requiring immediate patching…

Top 10 Best Patch Management Software For IT Security 2025

In the relentless battle against cyber threats in 2025, unpatched software remains a gaping vulnerability exploited by attackers worldwide. Outdated operating systems, applications riddled with known flaws, and missing security updates create an open invitation for malware, ransomware, and data…

PoC Released for Fortinet FortiSIEM Command Injection Flaw

Security researchers have uncovered a severe pre-authentication command injection vulnerability in Fortinet’s FortiSIEM platform that allows attackers to completely compromise enterprise security monitoring systems without any credentials. The vulnerability, designated CVE-2025-25256, has already been exploited by attackers in real-world scenarios,…

Chinese Hackers Exploit Web Hosting Infrastructure for Cyberattacks

Cisco Talos researchers have uncovered a sophisticated Chinese-speaking advanced persistent threat (APT) group, designated UAT-7237, that has been actively targeting web hosting infrastructure in Taiwan since at least 2022. The group demonstrates significant operational overlaps with previously identified threat actor…

Top 10 Best NDR Solutions (Network Detection and Response) in 2025

The network remains the central nervous system of every organization. While endpoints and cloud environments are crucial, all digital activity ultimately traverses the network. Implementing the best NDR solutions is essential for monitoring and securing this critical infrastructure. Traditional perimeter…

10 Best Free Data Recovery Software 2025

Free data recovery software or tools are among the most essential tools, playing a crucial role in our lives. Although you can find dozens of them nowadays, their importance remains significant. Losing our data from a device due to failure…

ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows

The popular open-source image manipulation software ImageMagick has addressed four critical security vulnerabilities discovered by Google’s artificial intelligence-powered security research tool, Big Sleep. These flaws, affecting millions of applications worldwide that rely on ImageMagick for image processing, have been patched…

HexStrike AI Links ChatGPT, Claude, and Copilot to 150+ Security Tools

HexStrike AI, the leading autonomous cybersecurity framework, today announced seamless integration with ChatGPT, Claude, and GitHub Copilot, enabling these AI agents to orchestrate over 150 professional security tools for comprehensive penetration testing and vulnerability intelligence. This milestone empowers developers, red…

VirtualBox 7.2 Adds Windows 11/Arm VM Support and Key Bug Fixes

Oracle has released VirtualBox 7.2.0, a major update that significantly expands ARM virtualization capabilities and introduces comprehensive Windows 11/ARM support. Released on August 14, 2025, this update represents a substantial leap forward in cross-platform virtualization technology, addressing long-standing limitations and…

10 Best Managed Detection And Response (MDR) Companies in 2025

Organizations of all sizes face an unrelenting barrage of sophisticated cyber threats, from highly evolved ransomware strains and stealthy advanced persistent threats (APTs) to cunning social engineering campaigns—challenges that increasingly drive the adoption of MDR Services to enhance detection and…

Cisco Secure Firewall Snort 3 Vulnerability Enable DoS Attacks

A critical vulnerability discovered in Cisco’s Secure Firewall Threat Defense Software has been identified as CVE-2025-20217, posing significant risks to network security infrastructure worldwide. The vulnerability, affecting the Snort 3 Detection Engine, could allow unauthenticated remote attackers to launch denial…

HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks

Security researchers have disclosed a critical vulnerability in the HTTP/2 protocol that could enable massive distributed denial-of-service (DDoS) attacks, potentially affecting millions of web servers worldwide. The flaw, dubbed “MadeYouReset” and assigned CVE-2025-8671, was publicly disclosed on August 13, 2025,…