Category: GBHackers

IIS Servers Hijacked via Exposed ASP.NET Machine Keys — Malicious Modules Injected in the Wild
24
Oct
2025

IIS Servers Hijacked via Exposed ASP.NET Machine Keys — Malicious Modules Injected in the Wild

Security researchers have uncovered a sophisticated cyberattack campaign that exploited publicly exposed ASP.NET machine keys to compromise hundreds of Internet…

Ransomware Actors Targeting Global Public Sectors and Critical Infrastructure
24
Oct
2025

Ransomware Actors Targeting Global Public Sectors and Critical Infrastructure

The public sector faces an unprecedented cybersecurity crisis as ransomware actors intensify their assault on government entities worldwide. According to…

North Korean Hackers Target UAV Industry to Steal Confidential Data
24
Oct
2025

North Korean Hackers Target UAV Industry to Steal Confidential Data

ESET researchers have uncovered a sophisticated cyberespionage campaign targeting European defense companies specializing in unmanned aerial vehicle (UAV) technology. The…

Phishing Campaign Uses Unique UUIDs to Evade Secure Email Gateways
24
Oct
2025

Phishing Campaign Uses Unique UUIDs to Evade Secure Email Gateways

A sophisticated new phishing attack discovered in early February 2025 is successfully bypassing Secure Email Gateways (SEGs) and evading perimeter…

Microsoft Releases Urgent Fix for Windows Server Update Services RCE FLaw
24
Oct
2025

Microsoft Releases Urgent Fix for Windows Server Update Services RCE FLaw

Microsoft has released a critical security patch to address a severe remote code execution vulnerability affecting Windows Server Update Services…

Toys "R" Us Canada Data Breach Exposes Customer Personal Information
24
Oct
2025

Toys “R” Us Canada Data Breach Exposes Customer Personal Information

Toys “R” Us Canada has alerted its customers to a significant data breach that may have compromised personal information. The…

Over 3,000 Infected Videos Target Users
24
Oct
2025

Over 3,000 Infected Videos Target Users

Check Point Research has uncovered a massive malware distribution operation called the YouTube Ghost Network, featuring over 3,000 malicious videos…

Hackers Exploit Galaxy S25 0-Day to Turn On Camera and Track Users
24
Oct
2025

Hackers Exploit Galaxy S25 0-Day to Turn On Camera and Track Users

A critical zero-day vulnerability in Samsung’s flagship Galaxy S25 smartphone was successfully exploited at Pwn2Own Ireland 2025, demonstrating how attackers…

Hackers Steal Microsoft Teams Chats & Emails by Grabbing Access Tokens
24
Oct
2025

Hackers Steal Microsoft Teams Chats & Emails by Grabbing Access Tokens

Security researchers have discovered a sophisticated method that allows attackers to steal access tokens from Microsoft Teams, potentially granting unauthorized…

Ransomware Actors Target VMware Deployments
24
Oct
2025

Ransomware Actors Target VMware Deployments

The Agenda ransomware group has evolved its attack methodology with a sophisticated technique that deploys Linux ransomware variants directly on…

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars - GBHackers Security
24
Oct
2025

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars – GBHackers Security

SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious…

TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT
23
Oct
2025

TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT

In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and…