Category: GBHackers

Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets
18
Jul
2025

Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets

Infostealers are specialized malware variants that routinely steal large amounts of sensitive data from compromised systems. This includes session tokens,…

Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools
18
Jul
2025

Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools

Fancy Bear, designated as APT28 by cybersecurity experts, represents a sophisticated Russian cyberespionage collective operational since 2007, renowned for infiltrating…

Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials
18
Jul
2025

Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials

Threat actors have been using a sophisticated phishing operation to impersonate Turkish Aerospace Industries (TUSAŞ) in order to attack Turkish…

Hackers Exploit ClickFix Tactics to Spread NetSupport RAT, Latrodectus, and Lumma Stealer
18
Jul
2025

Hackers Exploit ClickFix Tactics to Spread NetSupport RAT, Latrodectus, and Lumma Stealer

Attackers are increasingly leveraging the ClickFix social engineering technique to distribute potent malware families, including NetSupport RAT, Latrodectus, and Lumma…

Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon
18
Jul
2025

Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon

Threat actors have been actively exploiting vulnerabilities in Ivanti Connect Secure, specifically CVE-2025-0282 and CVE-2025-22457, to deploy advanced malware, including…

Microsoft Defender for Office 365 Gets Enhanced Threat Dashboard
18
Jul
2025

Microsoft Defender for Office 365 Gets Enhanced Threat Dashboard

Microsoft has announced significant transparency improvements for its email security platform, introducing a new customer-facing dashboard that provides detailed visibility…

Grafana Flaws Allow User Redirection and Code Execution in Dashboards
18
Jul
2025

Grafana Flaws Allow User Redirection and Code Execution in Dashboards

Grafana Labs has released critical security patches addressing two significant vulnerabilities that could enable attackers to redirect users to malicious…

Google Sues BadBox 2.0 Botnet Operators Behind 10 Million+ Infected Devices
18
Jul
2025

Google Sues BadBox 2.0 Botnet Operators Behind 10 Million+ Infected Devices

Google has initiated legal proceedings against the operators of BadBox 2.0, identified as the largest botnet comprising internet-connected televisions and…

Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution
18
Jul
2025

Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution

Sophos has disclosed three critical security vulnerabilities in its Intercept X for Windows endpoint security solution that could allow attackers…

New QR Code Attacks Through PDFs Bypass Detection and Steal Credentials
18
Jul
2025

New QR Code Attacks Through PDFs Bypass Detection and Steal Credentials

Researchers at Cyble Research and Intelligence Labs (CRIL) have uncovered an ongoing quishing campaign dubbed “Scanception,” which exploits QR code-based…

Ubiquiti UniFi Vulnerability Lets Hackers Inject Malicious Commands
18
Jul
2025

Ubiquiti UniFi Vulnerability Lets Hackers Inject Malicious Commands

A critical security vulnerability has been discovered in Ubiquiti’s UniFi Access devices that could allow malicious actors to inject and…

BIND 9 Vulnerabilities Enable Cache Poisoning and Service Disruption
18
Jul
2025

BIND 9 Vulnerabilities Enable Cache Poisoning and Service Disruption

The Internet Systems Consortium (ISC) has disclosed two critical security vulnerabilities in BIND 9, one of the most widely used…