Category: GBHackers

Hackers Allegedly Breach Nokia’s Internal Network
31
Jul
2025

Hackers Allegedly Breach Nokia’s Internal Network

A cybercriminal group has allegedly infiltrated Nokia’s internal network through a vulnerable third-party contractor, potentially exposing sensitive information belonging to…

APT Hackers Target Maritime and Shipping Industry for Ransomware Attacks
30
Jul
2025

APT Hackers Target Maritime and Shipping Industry for Ransomware Attacks

The maritime sector, which facilitates approximately 90% of international trade, is facing an unprecedented surge in sophisticated cyberattacks from advanced…

Apple Patches Multiple Vulnerabilities, Including Safari Vulnerability Abused in Chrome 0-Day Attacks
30
Jul
2025

Apple Patches Multiple Vulnerabilities, Including Safari Vulnerability Abused in Chrome 0-Day Attacks

Apple has released a comprehensive set of security updates across its entire product ecosystem on July 29, 2025, addressing multiple…

LLM Honeypots Can Deceive Threat Actors into Exposing Binaries and Known Exploits
30
Jul
2025

LLM Honeypots Can Deceive Threat Actors into Exposing Binaries and Known Exploits

Large language model (LLM)-powered honeypots are becoming increasingly complex instruments for luring and examining threat actors in the rapidly changing…

Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media
30
Jul
2025

Hackers Deploy Cobalt Strike Beacon Using GitHub and Social Media

A sophisticated cyberattack campaign disrupted the Russian IT industry and entities in several other countries, leveraging advanced evasion techniques to…

Qilin Ransomware Uses TPwSav.sys Driver to Bypass EDR Security Measures
30
Jul
2025

Qilin Ransomware Uses TPwSav.sys Driver to Bypass EDR Security Measures

Cybercriminals affiliated with the Qilin ransomware-as-a-service (RaaS) operation have demonstrated advanced evasion techniques by exploiting a previously undocumented vulnerable driver,…

Threat Actors Use LNK Files to Deploy RedLoader Malware on Windows Systems
30
Jul
2025

Threat Actors Use LNK Files to Deploy RedLoader Malware on Windows Systems

Sophos analysts have identified a novel infection chain employed by the financially motivated cybercriminal group GOLD BLADE, also known as…

New Spear Phishing Attack Distributes VIP Keylogger Through Email Attachment
30
Jul
2025

New Spear Phishing Attack Distributes VIP Keylogger Through Email Attachment

Threat actors have revived the sophisticated VIP keylogger malware, previously detailed in an earlier white paper for its use of…

Researchers Reveal North Korean Threat Actors' Tactics for Uncovering Illicit Access
30
Jul
2025

Researchers Reveal North Korean Threat Actors’ Tactics for Uncovering Illicit Access

Cybersecurity researchers from Flashpoint have exposed the intricate tactics employed by North Korean threat actors to infiltrate global organizations through…

Microsoft SharePoint Server 0-Day Exploit Targets African Treasury, Companies, and University
30
Jul
2025

Microsoft SharePoint Server 0-Day Exploit Targets African Treasury, Companies, and University

A sophisticated zero-day exploit campaign targeting unpatched vulnerabilities in Microsoft SharePoint Server has compromised approximately 400 organizations worldwide, with potential…

Lazarus Group Enhances Malware with New OtterCookie Payload Delivery Technique
30
Jul
2025

Lazarus Group Enhances Malware with New OtterCookie Payload Delivery Technique

The Contagious Interview campaign conducted by the Lazarus Group continues to expand its capabilities. We have observed an exponential evolution…

WordPress Theme Security Vulnerability Enables to Execute Arbitrary Code Remotely
30
Jul
2025

WordPress Theme Security Vulnerability Enables to Execute Arbitrary Code Remotely

A critical security vulnerability has been discovered in the popular “Alone” WordPress theme that allows unauthenticated attackers to execute arbitrary…