Category: GBHackers

Critical Hikvision Vulnerabilities Allow Remote Command Injection
29
Aug
2025

Critical Hikvision Vulnerabilities Allow Remote Command Injection

On August 28, 2025, the Hikvision Security Response Center (HSRC) issued Security Advisory SN No. HSRC-202508-01, detailing three critical vulnerabilities…

VirusTotal Launches Endpoint That Explains Code Functionality for Malware Analysts
29
Aug
2025

VirusTotal Launches Endpoint That Explains Code Functionality for Malware Analysts

Virustotal today unveiled a powerful addition to its Code Insight suite: a dedicated API endpoint that accepts code snippets—either disassembled…

29
Aug
2025

Popular Nx Packages Compromised by Credential-Stealing Malware

A widespread supply chain attack on the popular Nx build system has compromised dozens of high-traffic packages, exposing sensitive credentials…

TransUnion Data Breach Compromises Over 4 Million Customers
29
Aug
2025

TransUnion Data Breach Compromises Over 4 Million Customers

In a significant data breach disclosed by TransUnion LLC, more than 4.4 million consumers had sensitive personal information compromised in…

Microsoft Teams Abused in Cyberattack Delivering PowerShell-Based Remote Access Malware
29
Aug
2025

Microsoft Teams Abused in Cyberattack Delivering PowerShell-Based Remote Access Malware

In a concerning development for enterprise security, cybercriminals have begun exploiting Microsoft Teams—long trusted as an internal messaging and collaboration…

New Mac Malware Dubbed "JSCoreRunner" Weaponizing PDF Conversion Site to Deliver Malware
29
Aug
2025

New Mac Malware Dubbed “JSCoreRunner” Weaponizing PDF Conversion Site to Deliver Malware

A sophisticated new Mac malware campaign has emerged that exploits users’ trust in free online PDF conversion tools, demonstrating how…

DPRK Remote Work Tactics: Leveraging Code-Sharing Platforms
29
Aug
2025

DPRK Remote Work Tactics: Leveraging Code-Sharing Platforms

DPRK IT workers have leveraged popular code-sharing platforms such as GitHub, CodeSandbox, and Medium to cultivate convincing developer portfolios and…

Threat Actors Use Facebook Ads to Deliver Android Malware
29
Aug
2025

Threat Actors Use Facebook Ads to Deliver Android Malware

Cybercriminals are increasingly turning their sights from desktop to mobile, exploiting Meta’s advertising platform to distribute a sophisticated Android banking…

29
Aug
2025

New Mac Malware Dubbed “JSCoreRunner” Weaponizing PDF Conversion Site to Deliver Malware

A sophisticated new Mac malware campaign has emerged that exploits users’ trust in free online PDF conversion tools, demonstrating how…

Silver Fox Hackers Use Driver Vulnerability to Evade Security on Windows Systems
29
Aug
2025

Silver Fox Hackers Use Driver Vulnerability to Evade Security on Windows Systems

A sophisticated campaign by the Silver Fox APT group that exploits a previously unknown vulnerable driver to bypass endpoint detection…

Farmers Insurance Breach Exposes Data of 1.1 Million Customers via Salesforce Compromise
29
Aug
2025

Farmers Insurance Breach Exposes Data of 1.1 Million Customers via Salesforce Compromise

Farmers Insurance has disclosed a data breach stemming from unauthorized access to a third-party vendor’s database, potentially compromising the personal…

Weaponized ScreenConnect RMM Tool Deceives Users into Installing Xworm RAT
29
Aug
2025

Weaponized ScreenConnect RMM Tool Deceives Users into Installing Xworm RAT

The SpiderLabs Threat Hunt Team recently discovered a cyber campaign in which threat actors used the genuine ScreenConnect remote management…