Category: GBHackers

Weaponized Python Package "termncolor" Uses Windows Run Key for Persistence
18
Aug
2025

Weaponized Python Package “termncolor” Uses Windows Run Key for Persistence

Cybersecurity experts discovered a complex supply chain attack that originated from the Python Package Index (PyPI) in a recent disclosure…

Threat Actors Exploit Telegram as the Communication Channel to Exfiltrate Stolen Data
18
Aug
2025

Threat Actors Exploit Telegram as the Communication Channel to Exfiltrate Stolen Data

tLab Technologies, a Kazakhstan-based company that specializes in advanced threat prevention, discovered one of the first known phishing attempts in…

Technical Details of SAP 0-Day Exploitation Script for RCE Revealed
18
Aug
2025

Technical Details of SAP 0-Day Exploitation Script for RCE Revealed

Cybersecurity researchers have unveiled the inner workings of an exploit script targeting a critical zero-day vulnerability in SAP NetWeaver’s Visual…

Linux Kernel Netfilter Flaw Enables Privilege Escalation
18
Aug
2025

Linux Kernel Netfilter Flaw Enables Privilege Escalation

A critical vulnerability in the Linux kernel’s netfilter subsystem has been discovered that allows local attackers to escalate privileges through…

DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group
18
Aug
2025

DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group

The Department of Justice has announced a significant victory against cybercriminals, seizing over $2.8 million in cryptocurrency and additional assets…

Bragg Confirms Cyberattack, Internal IT Systems Breached
18
Aug
2025

Bragg Confirms Cyberattack, Internal IT Systems Breached

Bragg Gaming Group (NASDAQ: BRAG, TSX: BRAG), a prominent content and technology provider in the online gaming industry, has disclosed…

New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
18
Aug
2025

New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards

Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution…

North Korean Hackers’ Secret Linux Malware Surfaces Online
18
Aug
2025

North Korean Hackers’ Secret Linux Malware Surfaces Online

Phrack Magazine’s latest issue #72 has unveiled a significant data leak from a suspected North Korean hacking operation, including exploit…

Workday Data Breach Exposes HR Records via Third-Party CRM Hack
18
Aug
2025

Workday Data Breach Exposes HR Records via Third-Party CRM Hack

Enterprise software giant Workday has disclosed a security incident involving unauthorized access to employee information through a compromised third-party customer…

How LLMs Revive Classic Cyber Threats
18
Aug
2025

How LLMs Revive Classic Cyber Threats

In an era where users rely on vigilance against shady websites and file hashing via platforms like VirusTotal, a new…

Scammers Target Back-to-School Deals, Diverting Shoppers to Fraud Sites
18
Aug
2025

Scammers Target Back-to-School Deals, Diverting Shoppers to Fraud Sites

As the back-to-school season intensifies, cybercriminals are exploiting the heightened online shopping activity by deploying sophisticated scams aimed at siphoning…

Hundreds of TeslaMate Servers Expose Real-Time Vehicle Data
18
Aug
2025

Hundreds of TeslaMate Servers Expose Real-Time Vehicle Data

A security researcher has discovered that hundreds of self-hosted TeslaMate servers are exposing sensitive Tesla vehicle data to the public…