Category: GBHackers

SAP 0-Day Exploit Reportedly Leaked by ShinyHunters Hackers
19
Aug
2025

SAP 0-Day Exploit Reportedly Leaked by ShinyHunters Hackers

A sophisticated exploit targeting critical SAP vulnerabilities has been publicly released by the notorious hacking group ShinyHunters, significantly escalating the…

North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware
19
Aug
2025

North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware

The Trellix Advanced Research Center exposed a DPRK-linked espionage operation attributed to the Kimsuky group (APT43), targeting diplomatic missions in…

Microsoft Defender AI Can Detect Plaintext Credentials in Active Directory
19
Aug
2025

Microsoft Defender AI Can Detect Plaintext Credentials in Active Directory

Microsoft has unveiled a new AI-powered security capability that addresses one of cybersecurity’s most persistent vulnerabilities: plaintext credentials stored in…

PyPI Blocks Expired Domain Access to Prevent Resurrection Attacks
19
Aug
2025

PyPI Blocks Expired Domain Access to Prevent Resurrection Attacks

The Python Package Index (PyPI) has implemented new security measures to protect against domain resurrection attacks, a sophisticated supply-chain threat…

New Sni5Gect Attack Targets 5G to Steal Messages and Inject Payloads
19
Aug
2025

New Sni5Gect Attack Targets 5G to Steal Messages and Inject Payloads

Cybersecurity researchers at Singapore University of Technology and Design have unveiled a sophisticated new attack framework called SNI5GECT that can intercept 5G…

Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process
19
Aug
2025

Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process

A recent reverse engineering analysis of a Lockbit ransomware variant targeting Linux-based ESXi servers has uncovered several sophisticated evasion techniques…

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware
19
Aug
2025

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware

The PipeMagic malware, which is credited to the financially motivated threat actor Storm-2460, is a remarkable illustration of how cyber…

Malicious npm Packages Target Crypto Developers to Steal Login Credentials
19
Aug
2025

Malicious npm Packages Target Crypto Developers to Steal Login Credentials

A sophisticated threat campaign dubbed “Solana-Scan” has emerged, deploying malicious npm packages aimed at infiltrating the Solana cryptocurrency ecosystem. Identified…

CISA Alerts on Active Exploitation of Trend Micro Apex One Vulnerability
19
Aug
2025

CISA Alerts on Active Exploitation of Trend Micro Apex One Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Trend Micro Apex One vulnerability to its Known Exploited…

Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters
19
Aug
2025

Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters

Cybercriminals have discovered a sophisticated new attack vector that weaponizes Cisco’s security infrastructure against users, according to recent research from…

Intel Websites Compromised, Allowing Hackers Access to Employee Data
19
Aug
2025

Intel Websites Compromised, Allowing Hackers Access to Employee Data

A series of critical security flaws in Intel’s internal web infrastructure exposed the personal details of more than 270,000 employees…

Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers
19
Aug
2025

Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage pirated game downloads to distribute HijackLoader, a modular malware…