Category: GBHackers

New ZipLine Campaign Targets Critical Manufacturing Firms with In-Memory MixShell Malware
27
Aug
2025

New ZipLine Campaign Targets Critical Manufacturing Firms with In-Memory MixShell Malware

Check Point Research has uncovered a highly persistent phishing operation dubbed ZipLine, which reverses traditional attack vectors by exploiting victims’…

APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files
27
Aug
2025

APT36 Targets Indian BOSS Linux Using Weaponized .desktop Shortcut Files

Researchers have unveiled ONEFLIP, a novel inference-time backdoor attack that compromises full-precision deep neural networks (DNNs) by flipping just one…

Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks
27
Aug
2025

Threat Actors Leverage AI Agents to Conduct Social Engineering Attacks

Cybersecurity landscapes are undergoing a paradigm shift as threat actors increasingly deploy agentic AI systems to orchestrate sophisticated social engineering…

China-Based Threat Actor Mustang Panda’s TTPs Leaked
26
Aug
2025

China-Based Threat Actor Mustang Panda’s TTPs Leaked

A significant milestone for cybersecurity experts is the disclosure of specific tactics, methods, and procedures (TTPs) used by Mustang Panda,…

Securden Unified PAM Flaw Allows Attackers to Bypass Authentication
26
Aug
2025

Securden Unified PAM Flaw Allows Attackers to Bypass Authentication

Securden Unified PAM is a comprehensive privileged access management platform that is used to store, manage, and monitor credentials across…

New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands
26
Aug
2025

New Hook Android Banking Malware Emerges with Advanced Features and 107 Remote Commands

Zimperium’s zLabs research team has identified a sophisticated new variant of the Hook Android banking trojan, marking a significant escalation…

CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited
26
Aug
2025

CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical vulnerability in Git (CVE-2025-48384) that…

Google Introduces Enhanced Developer Verification for Play Store App Distribution
26
Aug
2025

Google Introduces Enhanced Developer Verification for Play Store App Distribution

Google has announced that all Android apps installed on approved devices will soon need to be able to be traced…

OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks
26
Aug
2025

OneFlip Attack Backdoors AI Systems by Flipping a Single Bit in Neural Networks

CYFIRMA researchers have uncovered a campaign they have codenamed “OneFlip”, an operation that demonstrates how a single-bit modification inside a…

PoC Exploit Published for Chrome 0-Day Already Under Active Attack
26
Aug
2025

PoC Exploit Published for Chrome 0-Day Already Under Active Attack

A proof-of-concept exploit for a high-severity Google Chrome zero-day vulnerability has been published publicly, less than three months after the…

Weaponized PuTTY Delivered via Malicious Bing Ads Targets Kerberos and Active Directory services
26
Aug
2025

Weaponized PuTTY Delivered via Malicious Bing Ads Targets Kerberos and Active Directory services

Cybersecurity incidents increasingly exploit human vulnerabilities, including those of privileged users, as demonstrated in recent compromises involving trojanized versions of…

Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V
26
Aug
2025

Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V

Microsoft today announced the public preview of a new VM Conversion extension for Windows Admin Center, enabling IT administrators to migrate virtual…