Category: GBHackers

New Active Directory Attack Method Bypasses Authentication to Steal Data
07
Aug
2025

New Active Directory Attack Method Bypasses Authentication to Steal Data

Security researchers have uncovered a novel attack technique that exploits weaknesses in hybrid Active Directory (AD) and Entra ID environments…

HeartCrypt-Packed ‘AVKiller’ Tool Actively Deployed in Ransomware Attacks to Disable EDR
07
Aug
2025

HeartCrypt-Packed ‘AVKiller’ Tool Actively Deployed in Ransomware Attacks to Disable EDR

Threat actors are placing a higher priority on neutralizing endpoint detection and response (EDR) systems in order to remain stealthy…

‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel
07
Aug
2025

‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel

Security researchers have unveiled a sophisticated new attack technique called “Ghost Calls” that exploits popular web conferencing platforms to establish…

Nvidia Denies Presence of Backdoors, Kill Switches, or Spyware in Its Chips
07
Aug
2025

Nvidia Denies Presence of Backdoors, Kill Switches, or Spyware in Its Chips

Nvidia has issued a comprehensive denial regarding allegations that its graphics processing units contain backdoors, kill switches, or spyware, emphasizing…

HTTP/1.1 Vulnerability Could Let Attackers Hijack Millions of Sites
07
Aug
2025

HTTP/1.1 Vulnerability Could Let Attackers Hijack Millions of Sites

Security researchers have unveiled a fundamental vulnerability in HTTP/1.1 that could allow attackers to hijack millions of websites, highlighting a…

WhatsApp Removes 6.8 Million Accounts Over Malicious Activity Concerns
07
Aug
2025

WhatsApp Removes 6.8 Million Accounts Over Malicious Activity Concerns

WhatsApp has permanently removed 6.8 million accounts during the first half of 2024 as part of an aggressive crackdown on…

Hackers Exploit Social Engineering to Gain Remote Access in Just 5 Minutes
07
Aug
2025

Hackers Exploit Social Engineering to Gain Remote Access in Just 5 Minutes

Cybersecurity experts are raising alarms over a sophisticated social engineering attack that allowed threat actors to compromise corporate systems in…

New Microsoft Exchange Server Vulnerability Allows Unauthorized Admin Privilege Escalation
07
Aug
2025

New Microsoft Exchange Server Vulnerability Allows Unauthorized Admin Privilege Escalation

Microsoft has disclosed a high-severity security vulnerability affecting Exchange Server hybrid deployments that could allow attackers with administrative access to…

Mustang Panda Targets Windows Users with ToneShell Malware Disguised as Google Chrome
07
Aug
2025

Mustang Panda Targets Windows Users with ToneShell Malware Disguised as Google Chrome

The China-aligned threat actor Mustang Panda, also known as Earth Preta, HIVE0154, RedDelta, and Bronze President, has been deploying the…

Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT
07
Aug
2025

Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT

North Korean state-sponsored threat actors associated with the Lazarus Group, specifically the subgroup known as Famous Chollima, have evolved their…

Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities
06
Aug
2025

Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities

The Acronis Threat Research Unit (TRU) dissected recent samples from the Akira and Lynx ransomware families, revealing incremental enhancements in…

Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets
06
Aug
2025

Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets

SentinelLABS has exposed a sophisticated series of cryptocurrency scams where threat actors distribute malicious smart contracts masquerading as automated trading…