Category: GBHackers

Pro-Russian Hacktivist Targets OT/ICS Systems to Harvest Credentials
13
Oct
2025

Pro-Russian Hacktivist Targets OT/ICS Systems to Harvest Credentials

In September, a nascent pro-Russian hacktivist group known as TwoNet staged its first operational technology and industrial control systems (OT/ICS)…

13
Oct
2025

Pro-Russian Hacktivist Targets OT/ICS Systems to Harvest Credentials

In September, a nascent pro-Russian hacktivist group known as TwoNet staged its first operational technology and industrial control systems (OT/ICS)…

Russian Cybercrime Marketplace Shifting from RDP Access to Malware Stealer Log Exploits
13
Oct
2025

Russian Cybercrime Marketplace Shifting from RDP Access to Malware Stealer Log Exploits

The online cybercrime marketplace, Russian Market, has evolved from selling Remote Desktop Protocol (RDP) access to becoming one of the…

Hackers Target macOS Users with Fake Homebrew Websites to Deliver Malicious Payloads
13
Oct
2025

Hackers Target macOS Users with Fake Homebrew Websites to Deliver Malicious Payloads

In September 2025, Kandji’s security researchers uncovered a sophisticated campaign in which attackers deployed multiple spoofed Homebrew installer sites that…

Axis Communications Vulnerability Exposes Azure Storage Credentials
13
Oct
2025

Axis Communications Vulnerability Exposes Azure Storage Credentials

Axis Communications, a leading provider of network video and surveillance solutions, has confirmed a critical vulnerability in its Autodesk® Revit®…

North Korean Hackers Target Developers with 338 Malicious Software Packages
13
Oct
2025

North Korean Hackers Target Developers with 338 Malicious Software Packages

North Korean threat actors have escalated their Contagious Interview campaign, deploying 338 malicious npm packages with over 50,000 downloads to…

Astaroth Banking Malware Exploits GitHub for Hosting Configuration Files
13
Oct
2025

Astaroth Banking Malware Exploits GitHub for Hosting Configuration Files

McAfee’s Threat Research team recently uncovered a sophisticated new Astaroth campaign that represents a significant evolution in malware infrastructure tactics….

Microsoft Finally Resolves Persistent Windows 11 ‘Update and Shut Down’ Glitch
13
Oct
2025

Microsoft Finally Resolves Persistent Windows 11 ‘Update and Shut Down’ Glitch

Microsoft has successfully addressed one of Windows 11’s most frustrating issues with its latest preview builds, finally fixing the notorious…

Happy DOM Flaw Allows Remote Code Execution Affecting 2.7 Million Users
13
Oct
2025

Happy DOM Flaw Allows Remote Code Execution Affecting 2.7 Million Users

A critical security vulnerability has been discovered in Happy DOM, a popular JavaScript library used for server-side rendering and testing…

Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder
13
Oct
2025

Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder

Spanish law enforcement recently dismantled an advanced AI-driven phishing network and arrested the mastermind developer known as “GoogleXcoder.” This operation…

WhatsApp Worm Targets Users with Banking Malware, Steals Login Information
13
Oct
2025

WhatsApp Worm Targets Users with Banking Malware, Steals Login Information

Cybersecurity researchers have uncovered a sophisticated new campaign targeting WhatsApp users in Brazil with self-propagating malware designed to steal banking…

Hackers Claim Massive Salesforce Breach: 1 Billion Records Stolen
13
Oct
2025

Hackers Claim Massive Salesforce Breach: 1 Billion Records Stolen

A new cybercriminal conglomerate known as Scattered Lapsus$ Hunters has emerged as a significant threat to global organizations, claiming responsibility…