Category: GBHackers

New Android Spyware Masquerading as Antivirus Targets Business Executives
25
Aug
2025

New Android Spyware Masquerading as Antivirus Targets Business Executives

Doctor Web’s antivirus laboratory has identified a sophisticated Android backdoor malware, designated Android.Backdoor.916.origin, which has been evolving since its initial…

Hackers Disrupt Iranian Ships via Maritime Communication Terminals Exploiting MySQL Database
25
Aug
2025

Hackers Disrupt Iranian Ships via Maritime Communication Terminals Exploiting MySQL Database

The National Iranian Tanker Company (NITC) and Islamic Republic of Iran Shipping Lines (IRISL), two sanctioned companies, are the operators…

Proxyware Malware Poses as YouTube Video Download Site, Delivering Malicious JavaScript
25
Aug
2025

Proxyware Malware Poses as YouTube Video Download Site, Delivering Malicious JavaScript

Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a persistent campaign where attackers distribute proxyware malware through fake…

Only 7 Days Left for Early Bird Registration to the OpenSSL Conference 2025
25
Aug
2025

Only 7 Days Left for Early Bird Registration to the OpenSSL Conference 2025

Only 7 days left to secure the Early Bird registration at the OpenSSL Conference 2025, October 7 – 9 in…

Fake Google Play Store Websites Deliver Potent RAT to Steal Sensitive Data
25
Aug
2025

Fake Google Play Store Websites Deliver Potent RAT to Steal Sensitive Data

Cybersecurity researchers have uncovered a persistent campaign deploying the AndroidOS SpyNote malware, a sophisticated Remote Access Trojan (RAT) designed for…

Chinese APT Leverages Proxy and VPN Services to Obfuscate Infrastructure
25
Aug
2025

Chinese APT Leverages Proxy and VPN Services to Obfuscate Infrastructure

A significant data dump surfaced on DDoSecrets.com, purportedly extracted from a workstation belonging to a threat actor targeting organizations in…

Hackers Use AI-Generated Summaries to Deliver Ransomware Payloads
25
Aug
2025

Hackers Use AI-Generated Summaries to Deliver Ransomware Payloads

Cybercriminals have unveiled a novel variation of the ClickFix social engineering technique that weaponizes AI-powered summarization tools to stealthily distribute…

0-Click Zendesk Flaw Lets Hackers Hijack Accounts and View All Tickets
25
Aug
2025

0-Click Zendesk Flaw Lets Hackers Hijack Accounts and View All Tickets

A critical zero-click vulnerability in Zendesk’s Android SDK has been uncovered, enabling attackers to hijack support accounts and harvest every…

Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization - GBHackers Security
25
Aug
2025

Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization – GBHackers Security

Dover, DE, United States, August 25th, 2025, CyberNewsWire Attaxion announces the addition of the Agentless Traffic Monitoring capability to its exposure management platform….

Arch Linux Services Hit by Week-Long DDoS Attack
25
Aug
2025

Arch Linux Services Hit by Week-Long DDoS Attack

Arch Linux—the community-driven, lightweight distribution renowned for its rolling-release model—has confirmed that a distributed denial-of-service (DDoS) attack has been targeting…

Chinese Hacker Sentenced for Kill Switch Attack on Ohio Firm’s Global Network
25
Aug
2025

Chinese Hacker Sentenced for Kill Switch Attack on Ohio Firm’s Global Network

A federal court has handed down a four-year prison term to a former software developer who sabotaged his employer’s global…

Threat Actors Exploit Windows Scheduled Tasks for Stealthy Persistence Without Additional Tools
25
Aug
2025

Threat Actors Exploit Windows Scheduled Tasks for Stealthy Persistence Without Additional Tools

Threat actors continue to use Scheduled Tasks and other built-in Windows features to create persistence in the ever-changing world of…