Category: GBHackers

Bulletproof Hosting Provider Powering Global Malware Campaigns
29
Jul
2025

Bulletproof Hosting Provider Powering Global Malware Campaigns

Security researchers may have discovered a reliable hosting company run by Qwins Ltd. that supports a broad range of international…

Android Banking Malware Masquerades as Government Agencies to Attack Users
29
Jul
2025

Android Banking Malware Masquerades as Government Agencies to Attack Users

Cyble Research and Intelligence Labs (CRIL) has uncovered a sophisticated Android banking trojan dubbed RedHook, which disguises itself as legitimate…

Qilin Ransomware Gains Momentum with Legal Assistance Option for Affiliates
29
Jul
2025

Qilin Ransomware Gains Momentum with Legal Assistance Option for Affiliates

The Qilin ransomware gang has introduced a “Call Lawyer” feature for its affiliates, announced on a Russian-speaking darknet forum. This…

New Capabilities and Exfiltration Techniques Exposed
29
Jul
2025

New Capabilities and Exfiltration Techniques Exposed

In the ever-evolving infostealer landscape, 0bj3ctivityStealer emerges as a formidable threat, blending advanced obfuscation with targeted data exfiltration. Discovered earlier…

ToxicPanda Android Banking Malware Compromises Over 4,500 Devices to Harvest Banking Credentials
29
Jul
2025

ToxicPanda Android Banking Malware Compromises Over 4,500 Devices to Harvest Banking Credentials

The ToxicPanda Android banking trojan has emerged as a significant threat, compromising over 4,500 devices primarily in Portugal and Spain…

Lazarus Subgroup 'TraderTraitor' Targets Cloud Platforms and Contaminates Supply Chains
29
Jul
2025

Lazarus Subgroup ‘TraderTraitor’ Targets Cloud Platforms and Contaminates Supply Chains

The North Korean state-sponsored advanced persistent threat (APT) known as TraderTraitor, a subgroup of the notorious Lazarus Group, has emerged…

Infection Chain and Escalation Tactics Exposed
29
Jul
2025

Infection Chain and Escalation Tactics Exposed

Lumma, a sophisticated C++-based information stealer, has surged in prevalence over recent years, posing significant risks to both individuals and…

SquareX Discloses Architectural Limitations Of Browser DevTools In Debugging Malicious Extensions
29
Jul
2025

SquareX Discloses Architectural Limitations Of Browser DevTools In Debugging Malicious Extensions

Palo Alto, California, July 29th, 2025, CyberNewsWire Despite the expanding use of browser extensions, the majority of enterprises and individuals…

Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems
29
Jul
2025

Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems

Security researchers at Tracebit have discovered a critical vulnerability in Google’s Gemini CLI that enables attackers to silently execute malicious…

Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities
29
Jul
2025

Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities

Security researchers have disclosed technical details of three previously patched vulnerabilities affecting SonicWall’s SMA100 series SSL-VPN appliances, highlighting concerning pre-authentication…

Microsoft Teams Introduces New Join Bar to Help Users Join Meetings on Time
29
Jul
2025

Microsoft Teams Introduces New Join Bar to Help Users Join Meetings on Time

Microsoft Teams is rolling out a new meeting join banner designed to streamline the meeting experience for users who have…

PyPI Alerts Developers to New Phishing Attack Using Fake PyPI Site
29
Jul
2025

PyPI Alerts Developers to New Phishing Attack Using Fake PyPI Site

Python developers are being warned about a sophisticated phishing campaign targeting users of the Python Package Index (PyPI) through fraudulent…