Category: GBHackers

Hackers Use Cellular Router API to Send Malicious SMS with Weaponized Links
30
Sep
2025

Hackers Use Cellular Router API to Send Malicious SMS with Weaponized Links

The monitoring and analysis of vulnerability exploitations are among the primary responsibilities of Sekoia.io’s Threat Detection & Research (TDR) team….

Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload
30
Sep
2025

Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload

Patchwork, the advanced persistent threat (APT) actor also known as Dropping Elephant, Monsoon, and Hangover Group, has been observed deploying…

New Chinese Nexus APT Group Targeting Organizations to Deploy NET-STAR Malware Suite
30
Sep
2025

New Chinese Nexus APT Group Targeting Organizations to Deploy NET-STAR Malware Suite

China-linked advanced persistent threat (APT) group Phantom Taurus has intensified espionage operations against government and telecommunications targets across Africa, the…

Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details
30
Sep
2025

Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details

An emerging phishing campaign is targeting job seekers by masquerading as Google Careers recruiters, delivering seemingly legitimate emails that lead…

Beer Maker Asahi Shuts Down Production Due to Cyberattack
30
Sep
2025

Beer Maker Asahi Shuts Down Production Due to Cyberattack

Japanese beer and beverage giant Asahi Group Holdings has been forced to halt production at its domestic factories as a…

Malicious AI Tools Being Distributed as Chrome Extensions by Threat Actors
30
Sep
2025

Malicious AI Tools Being Distributed as Chrome Extensions by Threat Actors

Cybercriminals are exploiting the growing popularity of artificial intelligence tools by distributing malicious Chrome browser extensions that masquerade as legitimate…

CISA Issues Alert on Actively Exploited Libraesva ESG Command Injection Vulnerability
30
Sep
2025

CISA Issues Alert on Actively Exploited Libraesva ESG Command Injection Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert highlighting the active exploitation of a serious…

CISA Issues Alert on Active Exploitation of Linux and Unix Sudo Flaw
30
Sep
2025

CISA Issues Alert on Active Exploitation of Linux and Unix Sudo Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has released an urgent alert for system administrators and IT teams worldwide. Researchers…

Malicious Code in Fake Postmark MCP Server Steals Thousands of Emails
30
Sep
2025

Malicious Code in Fake Postmark MCP Server Steals Thousands of Emails

A newly discovered attack on the npm ecosystem has exposed a deceptive backdoor embedded in a malicious package impersonating Postmark….

Threat Actors Exploiting MS-SQL Servers to Deploy XiebroC2 Framework
30
Sep
2025

Threat Actors Exploiting MS-SQL Servers to Deploy XiebroC2 Framework

A surge in attacks targeting improperly managed MS-SQL servers, culminating in the deployment of the open-source XiebroC2 command-and-control (C2) framework….

APT35 Hackers Targeting Government and Military to Steal Login Credentials
30
Sep
2025

APT35 Hackers Targeting Government and Military to Steal Login Credentials

Stormshield CTI researchers have identified two active phishing servers linked to APT35, revealing ongoing credential-stealing operations targeting government and military…

VMware Tools and Aria 0-Day Under Active Exploitation for Privilege Escalation
30
Sep
2025

VMware Tools and Aria 0-Day Under Active Exploitation for Privilege Escalation

Organizations using VMware hypervisors face an urgent threat as a local privilege escalation zero-day, tracked as CVE-2025-41244, is under active exploitation…