Category: GBHackers

Chinese Hackers Deploy Pubload Malware Using Tibetan Community Lures and Weaponized Filenames
26
Jun
2025

Chinese Hackers Deploy Pubload Malware Using Tibetan Community Lures and Weaponized Filenames

IBM X-Force researchers have uncovered a series of targeted cyberattacks orchestrated by the China-aligned threat actor Hive0154. Throughout 2025, this…

Cybercriminals Use TeamFiltration Pentesting Framework to Breach Microsoft Teams, OneDrive, Outlook, and More
26
Jun
2025

Cybercriminals Use TeamFiltration Pentesting Framework to Breach Microsoft Teams, OneDrive, Outlook, and More

Proofpoint threat researchers have exposed an active account takeover (ATO) campaign, dubbed UNK_SneakyStrike, exploiting the TeamFiltration pentesting framework to target…

CISA Issues Alert on Active Exploitation of D-Link Path Traversal Flaw
26
Jun
2025

CISA Issues Alert on Active Exploitation of D-Link Path Traversal Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert following evidence of active exploitation of a…

Researchers Demonstrate Windows Registry Manipulation via C++ Program
26
Jun
2025

Researchers Demonstrate Windows Registry Manipulation via C++ Program

Cybersecurity researchers have developed a C++ program demonstrating how attackers manipulate the Windows Registry to establish persistence, evade defenses, and…

IBM i Vulnerability Allows Attackers to Escalate Privileges
26
Jun
2025

IBM i Vulnerability Allows Attackers to Escalate Privileges

A critical security vulnerability has been identified in IBM i, potentially allowing attackers to escalate privileges and execute arbitrary code…

CISA Issues Alert on ControlID iDSecure Flaws Enabling Bypass Authentication
26
Jun
2025

CISA Issues Alert on ControlID iDSecure Flaws Enabling Bypass Authentication

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding critical vulnerabilities in ControlID’s iDSecure On-premises software,…

MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100 Unique IPs
26
Jun
2025

MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100 Unique IPs

A dramatic surge in scanning and exploitation activity targeting Progress Software’s MOVEit Transfer file-sharing platform has alarmed cybersecurity researchers and…

Authorities Arrest Five Operators Behind Infamous BreachForums Cybercrime Hub
26
Jun
2025

Authorities Arrest Five Operators Behind Infamous BreachForums Cybercrime Hub

In a sweeping crackdown that has sent shockwaves through the global cybercrime community, French authorities have arrested five key operators…

North Korean Hackers Pose as Recruiters, Target Developers with 35 New Malicious npm Packages
26
Jun
2025

North Korean Hackers Pose as Recruiters, Target Developers with 35 New Malicious npm Packages

A new cyber campaign orchestrated by North Korean threat actors has been exposed by the Socket Threat Research Team, revealing…

Multiple Brother Device Vulnerabilities Allow Attackers to Execute Arbitrary HTTP Requests
26
Jun
2025

Multiple Brother Device Vulnerabilities Allow Attackers to Execute Arbitrary HTTP Requests

A zero-day research project has uncovered eight new vulnerabilities in multifunction printers (MFPs) and related devices from Brother Industries, Ltd.,…

New Malware Discovered Using Prompt Injection to Manipulate AI Models in the Wild
25
Jun
2025

New Malware Discovered Using Prompt Injection to Manipulate AI Models in the Wild

Researchers have uncovered a new malware sample in the wild that employs a unique and unconventional evasion tactic: prompt injection…

Beware of Weaponized Wedding Invite Scams Delivering SpyMax RAT to Android Devices
25
Jun
2025

Beware of Weaponized Wedding Invite Scams Delivering SpyMax RAT to Android Devices

A sophisticated Android phishing campaign, aptly named “Wedding Invitation,” has emerged as a significant threat targeting mobile users across India….