Category: GBHackers

XwormRAT Hackers Leverage Code Injection for Sophisticated Malware Deployment
09
Jul
2025

XwormRAT Hackers Leverage Code Injection for Sophisticated Malware Deployment

A sophisticated new distribution method for XwormRAT malware that leverages steganography techniques to hide malicious code within legitimate files. This…

Anatsa Android Banking Malware Targets Users in the U.S. and Canada via Google Play
09
Jul
2025

Anatsa Android Banking Malware Targets Users in the U.S. and Canada via Google Play

A sophisticated new campaign involving the Anatsa Android banking trojan, marking its third major offensive against mobile banking customers in…

Windows BitLocker Vulnerability Lets Attackers Bypass Security Protections
09
Jul
2025

Windows BitLocker Vulnerability Lets Attackers Bypass Security Protections

Microsoft has disclosed a significant security vulnerability in Windows BitLocker that allows attackers to bypass critical security protections through a…

Splunk SOAR Addresses Vulnerabilities in Third-Party Packages – Update Now
09
Jul
2025

Splunk SOAR Addresses Vulnerabilities in Third-Party Packages – Update Now

Splunk has published a critical security advisory revealing that its Security Orchestration, Automation and Response (SOAR) platform was shipping vulnerable…

Splunk Enterprise Addresses Vulnerabilities in Bundled Third-Party Packages
09
Jul
2025

Splunk Enterprise Addresses Vulnerabilities in Bundled Third-Party Packages

Splunk has released critical security updates for its Enterprise platform, addressing multiple vulnerabilities in bundled third-party packages across several product…

Citrix Windows Virtual Delivery Agent Vulnerability Lets Attackers Escalate to SYSTEM Privileges
09
Jul
2025

Citrix Windows Virtual Delivery Agent Vulnerability Lets Attackers Escalate to SYSTEM Privileges

A critical security vulnerability has been discovered in Citrix’s Windows Virtual Delivery Agent that could allow attackers with low-level system…

FortiWeb SQL injection Vulnerability Allows Attackers to Execute Malicious SQL Commands
09
Jul
2025

FortiWeb SQL injection Vulnerability Allows Attackers to Execute Malicious SQL Commands

A critical security vulnerability has been discovered in Fortinet’s FortiWeb web application firewall that allows unauthenticated attackers to execute malicious…

Zoom for Windows Flaw Allows Attackers to Trigger DoS Attacks
09
Jul
2025

Zoom for Windows Flaw Allows Attackers to Trigger DoS Attacks

Security researchers have uncovered two significant vulnerabilities in Zoom Clients for Windows, exposing users to potential Denial of Service (DoS)…

NetSupport RAT Spreads Through Compromised WordPress Sites Using ClickFix Technique
09
Jul
2025

NetSupport RAT Spreads Through Compromised WordPress Sites Using ClickFix Technique

The Cybereason Global Security Operations Center (GSOC) has uncovered a sophisticated campaign by threat actors who are exploiting compromised WordPress…

Hackers Manipulate Search Results to Target IT Pros with Trojanized PuTTY and WinSCP
09
Jul
2025

Hackers Manipulate Search Results to Target IT Pros with Trojanized PuTTY and WinSCP

Arctic Wolf has uncovered a cunning cybersecurity threat that exploits search engine optimization (SEO) poisoning and malvertising tactics to distribute…

China-Linked VELETRIX Loader Used in Attacks on Telecommunications Infrastructure
09
Jul
2025

China-Linked VELETRIX Loader Used in Attacks on Telecommunications Infrastructure

A China-Nexus Threat Actor has launched a highly advanced assault against China Mobile Tietong Co., Ltd., a division of China…

11 Google-Verified Chrome Extensions Infected Over 1.7 Million Users
09
Jul
2025

11 Google-Verified Chrome Extensions Infected Over 1.7 Million Users

A chilling discovery by Koi Security has exposed a sophisticated browser hijacking campaign dubbed “RedDirection,” compromising over 1.7 million users…