Category: GBHackers

CISA Issues Alert on Cisco Identity Services Engine Flaw Exploited in Active Attacks
29
Jul
2025

CISA Issues Alert on Cisco Identity Services Engine Flaw Exploited in Active Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert regarding severe vulnerabilities in Cisco’s Identity Services…

Aeroflot Hit by Year‑Long Cyber Operation That Allegedly Wiped 7,000 Servers
29
Jul
2025

Aeroflot Hit by Year‑Long Cyber Operation That Allegedly Wiped 7,000 Servers

Russia’s flagship carrier Aeroflot is reeling from a devastating cyberattack that pro-Ukraine hacking groups claim wiped approximately 7,000 servers and…

Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning
28
Jul
2025

Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning

Threat actors have been using trojanized versions of well-known IT tools like PuTTY and WinSCP to spread the Oyster backdoor,…

ArmouryLoader Bypasses Security Protections to Inject Malicious Code
28
Jul
2025

ArmouryLoader Bypasses Security Protections to Inject Malicious Code

ArmouryLoader and other malicious code loaders have become essential tools for introducing Trojan-type payloads into hacked systems in the ever-changing…

Uncovering Five Critical Vulnerabilities in Microsoft SharePoint
28
Jul
2025

Uncovering Five Critical Vulnerabilities in Microsoft SharePoint

Security researchers from Kaspersky have detailed a sophisticated exploit chain dubbed “ToolShell,” actively targeting on-premise Microsoft SharePoint servers worldwide. The…

Chinese Hackers Exploit Software Vulnerabilities to Breach Targeted Systems
28
Jul
2025

Chinese Hackers Exploit Software Vulnerabilities to Breach Targeted Systems

China’s Cyberspace Administration, Ministry of Public Security, and Ministry of Industry and Information Technology introduced the Regulations on the Management…

UNC3886 Hackers Target Singapore’s Critical Infrastructure by Exploiting 0-Day Vulnerabilities
28
Jul
2025

UNC3886 Hackers Target Singapore’s Critical Infrastructure by Exploiting 0-Day Vulnerabilities

Singapore’s critical infrastructure sectors, including energy, water, telecommunications, finance, and government services, are facing an active cyberattack from UNC3886, a…

Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info
28
Jul
2025

Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info

Raven Stealer has emerged as sophisticated, lightweight information-stealing malware crafted in Delphi and C++, targeting Windows systems with a focus…

Threat Actors Claim Breach of Airpay Payment Gateway
28
Jul
2025

Threat Actors Claim Breach of Airpay Payment Gateway

Cybercriminals have reportedly claimed a successful breach of Airpay, an Indian payment gateway service, raising serious concerns about the security…

Inside Laundry Bear: Unveiling Infrastructure, Tactics, and Procedures
28
Jul
2025

Inside Laundry Bear: Unveiling Infrastructure, Tactics, and Procedures

Dutch intelligence agencies AIVD and MIVD, alongside Microsoft Threat Intelligence, have identified Laundry Bear also tracked as Void Blizzard as…

Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception
28
Jul
2025

Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception

Malware-as-a-service (MaaS) platforms like PhantomOS and Nebula are democratizing Android device attacks because they provide pre-built, subscription-based malware kits for…

LLM Honeypots Deceive Hackers into Exposing Attack Methods
28
Jul
2025

LLM Honeypots Deceive Hackers into Exposing Attack Methods

Cybersecurity researchers have successfully deployed artificial intelligence-powered honeypots to trick cybercriminals into revealing their attack strategies, demonstrating a promising new…