Category: GBHackers

SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion
22
Oct
2025

SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion

SharkStealer, a Golang-based information stealer, has been observed leveraging the Binance Smart Chain (BSC) Testnet as a covert dead-drop mechanism…

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data
22
Oct
2025

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Cybercriminals are increasingly exploiting a legitimate Microsoft 365 feature designed for enterprise convenience, turning Exchange Online’s Direct Send into a…

Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data
22
Oct
2025

Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data

In a newly uncovered campaign, the threat group known as Bitter—also tracked as APT-Q-37—has leveraged both malicious Office macros and…

Direct Memory Attacks Used to Capture Browser Credentials
22
Oct
2025

Direct Memory Attacks Used to Capture Browser Credentials

On October 6, 2025, the cybercriminal developer known as “Loadbaks” announced the release of Vidar Stealer v2.0 on underground forums,…

New Rust Malware “ChaosBot” Hides Command-and-Control Inside Discord
22
Oct
2025

New Rust Malware “ChaosBot” Hides Command-and-Control Inside Discord

A sophisticated, Rust-based malware dubbed ChaosBot has been exposed utilizing the Discord platform for its Command and Control (C2) operations….

Millions of Credentials Stolen Each Day by Stealer Malware
22
Oct
2025

Millions of Credentials Stolen Each Day by Stealer Malware

The cybercrime ecosystem surrounding stealer malware has reached unprecedented scale, with threat actors now processing millions of stolen credentials daily…

New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading
22
Oct
2025

New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading

Salt Typhoon represents one of the most persistent and sophisticated cyber threats targeting global critical infrastructure today. Believed to be…

Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets
22
Oct
2025

Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets

Cloud account takeover attacks have evolved beyond simple credential theft. Cybercriminals are now exploiting OAuth applications to maintain persistent access…

Apache Syncope Groovy Flaw Allows Remote Code Injection
21
Oct
2025

Apache Syncope Groovy Flaw Allows Remote Code Injection

Apache Syncope, has disclosed a critical security vulnerability that allows authenticated administrators to execute arbitrary code on affected systems. The…

New Luma Infostealer Malware Steals Browser Data, Cryptocurrency, and Remote Access Accounts
21
Oct
2025

New Luma Infostealer Malware Steals Browser Data, Cryptocurrency, and Remote Access Accounts

Luma Infostealer, a malware-as-a-service (MaaS) offering, has emerged as a potent threat targeting high-value credentials such as web browser cookies,…

Sendmarc Appoints Dan Levinson as Customer Success Director in North America
21
Oct
2025

Sendmarc Appoints Dan Levinson as Customer Success Director in North America

Wilmington, Delaware, October 21st, 2025, CyberNewsWire Sendmarc has announced the appointment of Dan Levinson as Customer Success Director – North…

Microsoft 365 Copilot Flaw Lets Hackers Steal Sensitive Data via Indirect Prompt Injection
21
Oct
2025

Microsoft 365 Copilot Flaw Lets Hackers Steal Sensitive Data via Indirect Prompt Injection

 A vulnerability in Microsoft 365 Copilot allowed attackers to trick the AI assistant into fetching and exfiltrating sensitive tenant data…