Category: GBHackers

CISA Issues Alert on Actively Exploited Citrix NetScaler ADC and Gateway Vulnerability
01
Jul
2025

CISA Issues Alert on Actively Exploited Citrix NetScaler ADC and Gateway Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert following the addition of a critical Citrix…

U.S. DOJ Cracks Down on North Korean Remote IT Workforce Operating Illegally
01
Jul
2025

U.S. DOJ Cracks Down on North Korean Remote IT Workforce Operating Illegally

The U.S. Department of Justice (DOJ) has announced a major crackdown on North Korea’s covert use of remote information technology…

Hackers Deliver Remcos Malware Via .pif Files and UAC Bypass in Windows
30
Jun
2025

Hackers Deliver Remcos Malware Via .pif Files and UAC Bypass in Windows

A sophisticated phishing campaign has emerged, distributing the notorious Remcos Remote Access Trojan (RAT) through the DBatLoader malware. This attack…

Threat Actors Exploit Facebook Ads to Distribute Malware and Steal Wallet Passwords
30
Jun
2025

Threat Actors Exploit Facebook Ads to Distribute Malware and Steal Wallet Passwords

The Pi Network community eagerly celebrated Pi2Day, an event traditionally associated with platform updates, feature launches, and significant milestones. However,…

DragonForce Ransomware Equips Affiliates with Modular Toolkit for Crafting Custom Payloads
30
Jun
2025

DragonForce Ransomware Equips Affiliates with Modular Toolkit for Crafting Custom Payloads

DragonForce Ransomware has emerged as a formidable player in the Ransomware-as-a-Service (RaaS) landscape since its debut in December 2023. Initially…

Germany Urges Apple and Google to Ban Chinese AI App DeepSeek Over Privacy Concerns
30
Jun
2025

Germany Urges Apple and Google to Ban Chinese AI App DeepSeek Over Privacy Concerns

Berlin’s data protection commissioner, Meike Kamp, has raised serious alarms over the Chinese AI application DeepSeek, accusing the company of…

Hackers Leverage Critical Langflow Flaw to Deploy Flodrix Botnet and Seize System Control
30
Jun
2025

Hackers Leverage Critical Langflow Flaw to Deploy Flodrix Botnet and Seize System Control

A sophisticated cyberattack campaign has emerged, exploiting a critical vulnerability in Langflow, a widely-used Python-based framework for building AI applications,…

Hackers Breach Norwegian Dam, Triggering Full Valve Opening
30
Jun
2025

Hackers Breach Norwegian Dam, Triggering Full Valve Opening

Hackers successfully took control of critical operational systems at a dam facility near Risevatnet in Bremanger, Norway, during April. The…

New Report Reveals Exploited Vulnerabilities as Leading Cause of Ransomware Attacks on Organizations
30
Jun
2025

New Report Reveals Exploited Vulnerabilities as Leading Cause of Ransomware Attacks on Organizations

A groundbreaking report titled “The State of Ransomware 2025” by Sophos, released in June 2025, has shed light on the…

Critical D-Link Router Flaws Allow Remote Code Execution by Attackers
30
Jun
2025

Critical D-Link Router Flaws Allow Remote Code Execution by Attackers

A series of critical security vulnerabilities have been identified in D-Link DIR-816 routers, exposing users worldwide to the risk of…

Glasgow City Warns of Parking Fine Scam Amid Ongoing Cybersecurity Incident
30
Jun
2025

Glasgow City Warns of Parking Fine Scam Amid Ongoing Cybersecurity Incident

Glasgow City Council has issued an urgent alert to drivers across the region following a surge in scam text messages…

Open-Source Rust Malware Analyzer Released by Microsoft
30
Jun
2025

Open-Source Rust Malware Analyzer Released by Microsoft

As cybercriminals and nation-state actors increasingly turn to the Rust programming language for malware development, Microsoft’s Threat Intelligence Center has…