Category: GBHackers

Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder
13
Oct
2025

Spanish Authorities Dismantle Advanced AI Phishing Operation GoogleXcoder

Spanish law enforcement recently dismantled an advanced AI-driven phishing network and arrested the mastermind developer known as “GoogleXcoder.” This operation…

WhatsApp Worm Targets Users with Banking Malware, Steals Login Information
13
Oct
2025

WhatsApp Worm Targets Users with Banking Malware, Steals Login Information

Cybersecurity researchers have uncovered a sophisticated new campaign targeting WhatsApp users in Brazil with self-propagating malware designed to steal banking…

Hackers Claim Massive Salesforce Breach: 1 Billion Records Stolen
13
Oct
2025

Hackers Claim Massive Salesforce Breach: 1 Billion Records Stolen

A new cybercriminal conglomerate known as Scattered Lapsus$ Hunters has emerged as a significant threat to global organizations, claiming responsibility…

Oracle E-Business Suite Flaw Enables Remote Code Execution and Data Theft
13
Oct
2025

Oracle E-Business Suite Flaw Enables Remote Code Execution and Data Theft

Oracle has issued a critical security alert for a severe vulnerability in its E-Business Suite platform that could allow attackers…

Attackers Exploit Defender for Endpoint Cloud API to Bypass Authentication and Disrupt Incident Response
13
Oct
2025

Attackers Exploit Defender for Endpoint Cloud API to Bypass Authentication and Disrupt Incident Response

Microsoft Defender for Endpoint’s cloud communication can be abused to bypass authentication, intercept commands, and spoof results, allowing attackers to…

Threat Actors Exploit Discord Webhooks for C2 via npm, PyPI, and Ruby Packages - GBHackers Security
12
Oct
2025

Threat Actors Exploit Discord Webhooks for C2 via npm, PyPI, and Ruby Packages – GBHackers Security

Threat actors are increasingly abusing Discord webhooks as covert command-and-control (C2) channels inside open-source packages, enabling stealthy exfiltration of secrets,…

New Stealit Malware Exploits Node.js Extensions to Target Windows Systems
11
Oct
2025

New Stealit Malware Exploits Node.js Extensions to Target Windows Systems

Security researchers have identified a new, active campaign of the Stealit malware that uses an experimental Node.js feature to infect…

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture
10
Oct
2025

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native Application Protection Platforms (CNAPP), is…

Chaosbot Using CiscoVPN and Active Directory Passwords for Network Commands
10
Oct
2025

Chaosbot Using CiscoVPN and Active Directory Passwords for Network Commands

Adversaries have once again demonstrated that operational hours are irrelevant when mounting sophisticated cyberattacks. eSentire’s TRU team first observed suspicious…

SonicWall SSL VPN Devices Targeted by Threat Actors to Distribute Akira Ransomware
10
Oct
2025

SonicWall SSL VPN Devices Targeted by Threat Actors to Distribute Akira Ransomware

A significant uptick in Akira ransomware attacks has been observed exploiting unpatched SonicWall SSL VPN devices between July and August…

175 Malicious npm Packages Targeting Tech and Energy Firms, 26,000 Downloads
10
Oct
2025

175 Malicious npm Packages Targeting Tech and Energy Firms, 26,000 Downloads

Socket’s Threat Research Team has uncovered a sprawling phishing campaign—dubbed “Beamglea”—leveraging 175 malicious npm packages that have amassed over 26,000…

GitHub Copilot Flaw Allows Attackers to Steal Source Code from Private Repositories
10
Oct
2025

GitHub Copilot Flaw Allows Attackers to Steal Source Code from Private Repositories

A critical weakness in GitHub Copilot Chat discovered in June 2025 exposed private source code and secrets to attackers. Rated…