Category: GBHackers

Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools
22
Aug
2025

Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools

Cyber threat actors have launched sophisticated phishing operations aimed at military and government personnel in South Asia, leveraging defense-related lures…

14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks
22
Aug
2025

14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks

A critical security vulnerability has been discovered in the widely-used sha.js npm package, exposing millions of applications to sophisticated hash…

UAC-0057 Leveraging Invitations to Trigger Shell Script Attacks
22
Aug
2025

UAC-0057 Leveraging Invitations to Trigger Shell Script Attacks

The Belarusian-affiliated threat actor UAC-0057, also known as UNC1151, FrostyNeighbor, or Ghostwriter, has been using weaponized archives that contain phony…

Weaponized RAR Files Deliver VShell Backdoor on Linux Systems
22
Aug
2025

Weaponized RAR Files Deliver VShell Backdoor on Linux Systems

Trellix Advanced Research Center has exposed an infection chain that weaponises nothing more than a filename to compromise Linux hosts….

Azure Default API Connection Flaw Enables Full Cross-Tenant Compromise
22
Aug
2025

Azure Default API Connection Flaw Enables Full Cross-Tenant Compromise

A critical security vulnerability in Microsoft Azure’s API Connection architecture has been discovered that could allow attackers to completely compromise…

Colt Confirms Ransomware Attack Resulted in Customer Data Theft
22
Aug
2025

Colt Confirms Ransomware Attack Resulted in Customer Data Theft

Industrial technology company Colt has confirmed that a recent ransomware attack on its business support systems resulted in the theft…

NIST Releases New Control Overlays to Manage Cybersecurity Risks in AI Systems
22
Aug
2025

NIST Releases New Control Overlays to Manage Cybersecurity Risks in AI Systems

The National Institute of Standards and Technology (NIST) has unveiled a comprehensive initiative to address the growing cybersecurity challenges associated…

22
Aug
2025

14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks

A critical security vulnerability has been discovered in the widely-used sha.js npm package, exposing millions of applications to sophisticated hash…

Windows Docker Desktop Vulnerability Allows Full Host Compromise
22
Aug
2025

Windows Docker Desktop Vulnerability Allows Full Host Compromise

A critical vulnerability in Docker Desktop for Windows has been discovered that allows any container to achieve full host system…

ChatGPT-5 Downgrade Attack Allows Hackers to Evade AI Defenses With Minimal Prompts
22
Aug
2025

ChatGPT-5 Downgrade Attack Allows Hackers to Evade AI Defenses With Minimal Prompts

Security researchers from Adversa AI have uncovered a critical vulnerability in ChatGPT-5 and other major AI systems that allows attackers…

Threat Actors Exploiting Victims’ Machines for Bandwidth Monetization
21
Aug
2025

Threat Actors Exploiting Victims’ Machines for Bandwidth Monetization

Cybersecurity researchers have uncovered an ongoing campaign where threat actors exploit the critical CVE-2024-36401 vulnerability in GeoServer, a geospatial database,…

Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data
21
Aug
2025

Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data

Quishing, a powerful form of phishing that uses malicious hyperlinks contained in QR codes to expose user credentials and sensitive…