Category: GBHackers

SmartLoader Malware Masquerades as Legitimate GitHub Repository to Infect Users
13
Aug
2025

SmartLoader Malware Masquerades as Legitimate GitHub Repository to Infect Users

AhnLab Security Intelligence Center (ASEC) has uncovered a sophisticated campaign involving the massive dissemination of SmartLoader malware through GitHub repositories…

Windows Remote Desktop Services Flaw Allows Network-Based Denial-of-Service Attacks
13
Aug
2025

Windows Remote Desktop Services Flaw Allows Network-Based Denial-of-Service Attacks

Microsoft disclosed a critical vulnerability in Windows Remote Desktop Services on August 12, 2025, that enables attackers to launch denial-of-service…

Hackers Deploy Dedicated Phishlet for FIDO Authentication Downgrade Attacks
13
Aug
2025

Hackers Deploy Dedicated Phishlet for FIDO Authentication Downgrade Attacks

Proofpoint researchers have uncovered a novel technique allowing threat actors to bypass FIDO-based authentication through downgrade attacks, leveraging a custom…

ShinyHunters May Have Teamed Up With Scattered Spider in Salesforce Attack Campaigns
13
Aug
2025

ShinyHunters May Have Teamed Up With Scattered Spider in Salesforce Attack Campaigns

The financially motivated threat group ShinyHunters has returned with a sophisticated series of attacks targeting Salesforce instances across high-profile enterprises…

Multiple GitLab Vulnerabilities Allow Account Takeover and Stored XSS Attacks
13
Aug
2025

Multiple GitLab Vulnerabilities Allow Account Takeover and Stored XSS Attacks

GitLab has released critical security patches addressing multiple high-severity vulnerabilities that could enable attackers to execute account takeovers and stored…

Web DDoS and App Exploitation Attacks Surge in First Half of 2025
13
Aug
2025

Web DDoS and App Exploitation Attacks Surge in First Half of 2025

Radware’s monitoring showed a 39% increase in Web DDoS attacks compared to the second half of 2024, culminating in a…

VexTrio Hackers Use Fake CAPTCHAs and Malicious Apps on Google Play & App Store to Target Users
13
Aug
2025

VexTrio Hackers Use Fake CAPTCHAs and Malicious Apps on Google Play & App Store to Target Users

Security researchers at Infoblox Threat Intel have revealed the complex workings of VexTrio, a highly skilled cybercriminal network that has…

Microsoft Office Vulnerabilities Allow Attackers to Execute Remote Code
13
Aug
2025

Microsoft Office Vulnerabilities Allow Attackers to Execute Remote Code

Microsoft has disclosed three critical security vulnerabilities in its Office suite that could enable attackers to execute malicious code remotely…

Microsoft Exchange Server Flaws Allow Network-Based Spoofing and Data Tampering
13
Aug
2025

Microsoft Exchange Server Flaws Allow Network-Based Spoofing and Data Tampering

Microsoft has disclosed critical security vulnerabilities in Exchange Server that could enable attackers to conduct network-based spoofing attacks and tamper…

Microsoft Teams RCE Flaw Allows Hackers to Read, Modify, and Delete Messages
13
Aug
2025

Microsoft Teams RCE Flaw Allows Hackers to Read, Modify, and Delete Messages

Microsoft has disclosed a critical remote code execution vulnerability in Microsoft Teams that could allow attackers to execute malicious code…

New Charon Ransomware Uses DLL Sideloading and Anti-EDR Tactics in Targeted Attacks
13
Aug
2025

New Charon Ransomware Uses DLL Sideloading and Anti-EDR Tactics in Targeted Attacks

Trend Micro researchers have uncovered a novel ransomware family dubbed Charon, deployed in a sophisticated campaign targeting the public sector…

Critical FortiSIEM Vulnerability Allows Attackers to Execute Malicious Commands, PoC Found in the Wild
13
Aug
2025

Critical FortiSIEM Vulnerability Allows Attackers to Execute Malicious Commands, PoC Found in the Wild

Security researchers have discovered a critical vulnerability in Fortinet’s FortiSIEM platform that enables remote attackers to execute unauthorized commands without…