Category: GBHackers

Threat Actors Distribute CoinMiner Malware through USB Drives to Infect Workstations
05
Dec
2025

Threat Actors Distribute CoinMiner Malware through USB Drives to Infect Workstations

Cybercriminals continue to exploit USB drives as infection vectors, with recent campaigns delivering sophisticated CoinMiner malware that establishes persistent cryptocurrency-mining…

Avast Antivirus Sandbox Vulnerabilities Allow Privilege Escalation
05
Dec
2025

Avast Antivirus Sandbox Vulnerabilities Allow Privilege Escalation

SAFA researchers uncovered four kernel heap overflow vulnerabilities in Avast Antivirus’s aswSnx.sys driver, designated CVE-2025-13032, affecting versions before 25.3 on…

Hackers Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells
05
Dec
2025

Hackers Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells

A critical command injection vulnerability in Array Networks’ ArrayOS AG systems has become the focus of active exploitation campaigns, with Japanese organizations…

Russian Calisto Hackers Target NATO Research with ClickFix Malware
05
Dec
2025

Russian Calisto Hackers Target NATO Research with ClickFix Malware

Russian intelligence-linked cyber threat actors have intensified their operations against NATO research organizations, Western defense contractors, and NGOs supporting Ukraine,…

Russian Hackers Imitate European Events in Coordinated Phishing Campaigns
05
Dec
2025

Russian Hackers Imitate European Events in Coordinated Phishing Campaigns

Russian state-linked hackers are impersonating high-profile European security conferences to compromise cloud email and collaboration accounts at governments, think tanks,…

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access
05
Dec
2025

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access

The cybersecurity landscape continues to evolve as threat actors deploy increasingly sophisticated tools to compromise Windows-based infrastructure. CastleRAT, a Remote…

New SVG Technique Enables Highly Interactive Clickjacking Attacks
05
Dec
2025

New SVG Technique Enables Highly Interactive Clickjacking Attacks

A security researcher has unveiled a novel web exploitation technique dubbed “SVG clickjacking,” which significantly elevates the sophistication of traditional…

New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer
05
Dec
2025

New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer

Cybersecurity researchers uncover a sophisticated Linux campaign that blends legacy botnet capabilities with modern evasion techniques. A newly discovered Linux…

CISA, NSA Alert on BRICKSTORM Malware Targeting VMware ESXi and Windows Systems
05
Dec
2025

CISA, NSA Alert on BRICKSTORM Malware Targeting VMware ESXi and Windows Systems

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA), joined by Canadian cyber authorities, have issued…

Session Cookie Theft and MFA Bypass Tactics
05
Dec
2025

Session Cookie Theft and MFA Bypass Tactics

Security researchers are issuing urgent warnings about a rising wave of cyberattacks leveraging Evilginx, an attacker-in-the-middle phishing toolkit that intercepts…

Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted
05
Dec
2025

Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted

Kohler’s Dekota toilet camera, launched in October as a $600 health-monitoring device, is facing significant scrutiny over its privacy claims….

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware
05
Dec
2025

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware

Despite extensive scrutiny and public reporting, commercial surveillance vendors continue to operate with alarming sophistication. Intellexa, a prominent mercenary spyware…