Category: GBHackers

WhatsApp 0-Click Flaw Abused via Malicious DNG Image File
29
Sep
2025

WhatsApp 0-Click Flaw Abused via Malicious DNG Image File

A newly discovered zero-click remote code execution (RCE) vulnerability in WhatsApp is putting millions of Apple users at risk. Researchers from DarkNavyOrg…

New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials
29
Sep
2025

New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials

Adversaries don’t work 9–5 and neither do we. At eSentire, our 24/7 SOCs are staffed with elite threat hunters and…

New TamperedChef Malware Exploits Productivity Tools to Access and Exfiltrate Sensitive Data
29
Sep
2025

New TamperedChef Malware Exploits Productivity Tools to Access and Exfiltrate Sensitive Data

A sophisticated malware campaign dubbed “TamperedChef” is exploiting trojanized productivity tools—disguised as seemingly benign applications—to bypass security controls, establish persistence,…

Jaguar Land Rover Confirms Gradual Restart of Operations Post-Cyberattack
29
Sep
2025

Jaguar Land Rover Confirms Gradual Restart of Operations Post-Cyberattack

Jaguar Land Rover (JLR) has announced the controlled resumption of manufacturing operations following a significant cyberattack that disrupted its production…

Acreed Infostealer Gaining Popularity Among Cybercriminals for C2 via Steam Platform
29
Sep
2025

Acreed Infostealer Gaining Popularity Among Cybercriminals for C2 via Steam Platform

Acreed, a novel infostealer first observed in February 2025, has rapidly gained traction among threat actors seeking discreet credential and…

Hackers Exploit Weaponized Microsoft Teams Installer to Deploy Oyster Malware
29
Sep
2025

Hackers Exploit Weaponized Microsoft Teams Installer to Deploy Oyster Malware

A sophisticated malvertising campaign has been targeting organizations through a weaponized Microsoft Teams installer that delivers the dangerous Oyster malware,…

ThreatBook Unveils Advanced Threat Intelligence Solution for Modern Cybersecurity
29
Sep
2025

ThreatBook Unveils Advanced Threat Intelligence Solution for Modern Cybersecurity

Singapore, Singapore, September 29th, 2025, CyberNewsWire Analyzing over 14 billion cyber-attack records daily, ThreatBook ATI is a global solution enriched…

Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data
29
Sep
2025

Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data

Cybercriminals expand malvertising campaigns from Facebook to Google Ads and YouTube, hijacking accounts to distribute crypto-stealing malware targeting financial platform…

New Olymp Loader Malware-as-a-Service Promises Defender Bypass with Auto Certificate Signing
29
Sep
2025

New Olymp Loader Malware-as-a-Service Promises Defender Bypass with Auto Certificate Signing

Olymp Loader, a newly emerged Malware-as-a-Service (MaaS) offering, has rapidly gained traction across underground forums and Telegram since its debut…

Formbricks Signature Verification Flaw Lets Attackers Reset User Passwords
29
Sep
2025

Formbricks Signature Verification Flaw Lets Attackers Reset User Passwords

A critical vulnerability in the open source Formbricks experience management toolbox allows attackers to reset any user’s password without authorization. Published three…

New ModStealer Evades Antivirus, Targets macOS Users to Steal Sensitive Data
29
Sep
2025

New ModStealer Evades Antivirus, Targets macOS Users to Steal Sensitive Data

A sophisticated new malware strain targeting macOS users has emerged, capable of bypassing traditional antivirus solutions while specifically targeting developers…

SUSE Rancher Flaws Allow Attackers to Lock Out Admin Accounts
29
Sep
2025

SUSE Rancher Flaws Allow Attackers to Lock Out Admin Accounts

A critical security vulnerability in SUSE Rancher Manager has been discovered that enables attackers with elevated privileges to lock out administrative accounts,…