Category: GBHackers

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials
21
Feb
2025

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has seen a significant increase in…

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims
21
Feb
2025

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack on Northwestern Polytechnical University, a…

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key
21
Feb
2025

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers to extract private keys used…

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix
21
Feb
2025

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow vulnerability CVE-2025-0282 in Ivanti Connect…

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks
21
Feb
2025

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities in its UniFi Protect camera…

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers"
21
Feb
2025

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated attackers to retrieve sensitive user…

Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks
21
Feb
2025

Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks

A critical security flaw in Fluent Bit, a widely adopted log processing and metrics collection tool part of the Cloud…

CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors
21
Feb
2025

CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors

The notorious CL0P ransomware group has intensified its operations in early 2025, targeting critical sectors such as telecommunications and healthcare….

Salt Typhoon Hackers Exploit Cisco vulnerability to Gain Device Access on US.Telecom Networks
21
Feb
2025

Salt Typhoon Hackers Exploit Cisco vulnerability to Gain Device Access on US.Telecom Networks

A highly advanced threat actor, dubbed “Salt Typhoon,” has been implicated in a series of cyberattacks targeting major U.S. telecommunications…

New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands
21
Feb
2025

New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands

The cybercriminal group behind the notorious “darcula-suite” platform has unveiled its latest iteration, darcula 3.0, which introduces groundbreaking capabilities for…

Adversary-in-the-Middle Hackers Exploit Vulnerabilities to Deploy Advanced Malware
21
Feb
2025

Adversary-in-the-Middle Hackers Exploit Vulnerabilities to Deploy Advanced Malware

Cybercriminals are increasingly leveraging sophisticated Adversary-in-the-Middle (AiTM) phishing techniques, enabled by the rise of Phishing-as-a-Service (PhaaS) ecosystems. These operations target…

CISA Issues Seven ICS Advisories Highlighting Critical Vulnerabilities
21
Feb
2025

CISA Issues Seven ICS Advisories Highlighting Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released seven Industrial Control Systems (ICS) advisories on February 20, 2025, addressing…