Category: GBHackers

CISA Issues Alert on Citrix Flaws Actively Exploited by Hackers
26
Aug
2025

CISA Issues Alert on Citrix Flaws Actively Exploited by Hackers

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent security alert after adding three critical vulnerabilities to its…

Hackers Scan IPs to Target Microsoft Remote Desktop Web Access
26
Aug
2025

Hackers Scan IPs to Target Microsoft Remote Desktop Web Access

A sophisticated scanning campaign has escalated dramatically, with threat intelligence firm GreyNoise detecting over 30,000 unique IP addresses simultaneously probing Microsoft Remote…

Beware! Google Ads Promote Fake Tesla Websites Soliciting Fraudulent Deposits
25
Aug
2025

Beware! Google Ads Promote Fake Tesla Websites Soliciting Fraudulent Deposits

Scammers are using Google Ads to pose as Tesla in an elaborate cybercrime campaign that aims to obtain illicit preorders…

ThreatActors Leverage Google Classroom to Target 13,500 Organizations
25
Aug
2025

ThreatActors Leverage Google Classroom to Target 13,500 Organizations

Google Classroom, a popular educational platform, has been exploited by threat actors to launch a major phishing campaign in a…

New Stealthy Malware Hijacking Cisco, TP-Link, and Other Routers for Remote Control
25
Aug
2025

New Stealthy Malware Hijacking Cisco, TP-Link, and Other Routers for Remote Control

FortiGuard Labs has uncovered a sophisticated malware campaign targeting critical infrastructure devices from multiple vendors, with the “Gayfemboy” malware strain…

New Android Spyware Masquerading as Antivirus Targets Business Executives
25
Aug
2025

New Android Spyware Masquerading as Antivirus Targets Business Executives

Doctor Web’s antivirus laboratory has identified a sophisticated Android backdoor malware, designated Android.Backdoor.916.origin, which has been evolving since its initial…

Hackers Disrupt Iranian Ships via Maritime Communication Terminals Exploiting MySQL Database
25
Aug
2025

Hackers Disrupt Iranian Ships via Maritime Communication Terminals Exploiting MySQL Database

The National Iranian Tanker Company (NITC) and Islamic Republic of Iran Shipping Lines (IRISL), two sanctioned companies, are the operators…

Proxyware Malware Poses as YouTube Video Download Site, Delivering Malicious JavaScript
25
Aug
2025

Proxyware Malware Poses as YouTube Video Download Site, Delivering Malicious JavaScript

Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a persistent campaign where attackers distribute proxyware malware through fake…

Only 7 Days Left for Early Bird Registration to the OpenSSL Conference 2025
25
Aug
2025

Only 7 Days Left for Early Bird Registration to the OpenSSL Conference 2025

Only 7 days left to secure the Early Bird registration at the OpenSSL Conference 2025, October 7 – 9 in…

Fake Google Play Store Websites Deliver Potent RAT to Steal Sensitive Data
25
Aug
2025

Fake Google Play Store Websites Deliver Potent RAT to Steal Sensitive Data

Cybersecurity researchers have uncovered a persistent campaign deploying the AndroidOS SpyNote malware, a sophisticated Remote Access Trojan (RAT) designed for…

Chinese APT Leverages Proxy and VPN Services to Obfuscate Infrastructure
25
Aug
2025

Chinese APT Leverages Proxy and VPN Services to Obfuscate Infrastructure

A significant data dump surfaced on DDoSecrets.com, purportedly extracted from a workstation belonging to a threat actor targeting organizations in…

Hackers Use AI-Generated Summaries to Deliver Ransomware Payloads
25
Aug
2025

Hackers Use AI-Generated Summaries to Deliver Ransomware Payloads

Cybercriminals have unveiled a novel variation of the ClickFix social engineering technique that weaponizes AI-powered summarization tools to stealthily distribute…