Category: GBHackers

Lazarus Subgroup 'TraderTraitor' Targets Cloud Platforms and Contaminates Supply Chains
29
Jul
2025

Lazarus Subgroup ‘TraderTraitor’ Targets Cloud Platforms and Contaminates Supply Chains

The North Korean state-sponsored advanced persistent threat (APT) known as TraderTraitor, a subgroup of the notorious Lazarus Group, has emerged…

Infection Chain and Escalation Tactics Exposed
29
Jul
2025

Infection Chain and Escalation Tactics Exposed

Lumma, a sophisticated C++-based information stealer, has surged in prevalence over recent years, posing significant risks to both individuals and…

SquareX Discloses Architectural Limitations Of Browser DevTools In Debugging Malicious Extensions
29
Jul
2025

SquareX Discloses Architectural Limitations Of Browser DevTools In Debugging Malicious Extensions

Palo Alto, California, July 29th, 2025, CyberNewsWire Despite the expanding use of browser extensions, the majority of enterprises and individuals…

Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems
29
Jul
2025

Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems

Security researchers at Tracebit have discovered a critical vulnerability in Google’s Gemini CLI that enables attackers to silently execute malicious…

Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities
29
Jul
2025

Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities

Security researchers have disclosed technical details of three previously patched vulnerabilities affecting SonicWall’s SMA100 series SSL-VPN appliances, highlighting concerning pre-authentication…

Microsoft Teams Introduces New Join Bar to Help Users Join Meetings on Time
29
Jul
2025

Microsoft Teams Introduces New Join Bar to Help Users Join Meetings on Time

Microsoft Teams is rolling out a new meeting join banner designed to streamline the meeting experience for users who have…

PyPI Alerts Developers to New Phishing Attack Using Fake PyPI Site
29
Jul
2025

PyPI Alerts Developers to New Phishing Attack Using Fake PyPI Site

Python developers are being warned about a sophisticated phishing campaign targeting users of the Python Package Index (PyPI) through fraudulent…

Linux 6.16 Released with Performance and Networking Enhancements
29
Jul
2025

Linux 6.16 Released with Performance and Networking Enhancements

Linux creator Linus Torvalds announced the release of Linux kernel version 6.16 on July 27, 2025, marking the end of…

Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web
29
Jul
2025

Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web

Outpost24’s threat intelligence researchers have uncovered the operations of Lionishackers, a financially motivated cyber threat actor specializing in the exfiltration…

New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC
29
Jul
2025

New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that enables attackers to bypass Apple’s Transparency, Consent, and Control (TCC)…

Threat Actors Use Phishing to Target Belgian Grand Prix Fans and Teams
29
Jul
2025

Threat Actors Use Phishing to Target Belgian Grand Prix Fans and Teams

Cybersecurity experts have pointed to an increase in sophisticated threat actor activity following the July 27 2025 Belgian Grand Prix…

CISA Issues Alert on PaperCut RCE Vulnerability Under Active Exploitation
29
Jul
2025

CISA Issues Alert on PaperCut RCE Vulnerability Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical PaperCut vulnerability to its Known Exploited Vulnerabilities (KEV) catalog,…