Category: GBHackers

New FileFix Exploit Uses Windows File Explorer to Run Malicious Commands
25
Jun
2025

New FileFix Exploit Uses Windows File Explorer to Run Malicious Commands

A newly discovered exploit, dubbed “FileFix,” is raising alarms in the cybersecurity community for its innovative use of Windows File…

EagleSpy v5 RAT Promoted by Hacker for Stealthy Android Access
24
Jun
2025

EagleSpy v5 RAT Promoted by Hacker for Stealthy Android Access

A notorious threat actor known as “xperttechy” is actively promoting a new version of the EagleSpy remote access Trojan (RAT),…

America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers
24
Jun
2025

America, Netflix, and Microsoft Hacked to Inject Fake Phone Numbers

Jérôme Segura, cybercriminals are exploiting search parameter vulnerabilities to inject fake phone numbers into the legitimate websites of major brands…

New DRAT V2 Update Enhances C2 Protocol with Shell Command Execution Capabilities
24
Jun
2025

New DRAT V2 Update Enhances C2 Protocol with Shell Command Execution Capabilities

A new variant of the DRAT remote access trojan (RAT), dubbed DRAT V2, has been uncovered as part of a…

Threat Actors Exploit ConnectWise Configuration to Create Signed Malware
24
Jun
2025

Threat Actors Exploit ConnectWise Configuration to Create Signed Malware

Threat actors have increasingly exploited vulnerabilities and configurations in ConnectWise software to distribute signed malware, masquerading as legitimate applications. Initially…

Gonjeshke Darande Hackers Pose as Activists to Infiltrate Iranian Crypto Exchange
24
Jun
2025

Gonjeshke Darande Hackers Pose as Activists to Infiltrate Iranian Crypto Exchange

Gonjeshke Darande, a cyber threat actor widely suspected to be an Israeli state-sponsored group masquerading as an Iranian opposition hacktivist…

Over 2,000 Devices Compromised by Weaponized Social Security Statement Phishing Attacks
24
Jun
2025

Over 2,000 Devices Compromised by Weaponized Social Security Statement Phishing Attacks

CyberArmor analysts have uncovered a meticulously crafted phishing campaign that has already compromised over 2,000 devices by exploiting the trusted…

Weaponized DMV-Themed Phishing Scam Targets U.S. Citizens to Steal Personal and Financial Data
24
Jun
2025

Weaponized DMV-Themed Phishing Scam Targets U.S. Citizens to Steal Personal and Financial Data

A highly coordinated phishing campaign impersonating various U.S. state Departments of Motor Vehicles (DMVs) has emerged as a significant threat,…

Zimbra Classic Web Client Vulnerability Allows Arbitrary JavaScript Execution
24
Jun
2025

Zimbra Classic Web Client Vulnerability Allows Arbitrary JavaScript Execution

A critical security flaw has been discovered and patched in the Zimbra Collaboration Suite (ZCS) Classic Web Client, exposing millions…

NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols
24
Jun
2025

NCSC Warns of SHOE RACK Malware Targeting Fortinet Firewalls via DOH & SSH Protocols

The National Cyber Security Centre (NCSC) has issued a critical alert regarding a newly identified malware, dubbed SHOE RACK, which…

Critical Convoy Flaw Allows Remote Code Execution on Servers
24
Jun
2025

Critical Convoy Flaw Allows Remote Code Execution on Servers

Credential Abuse Unmasked Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our…

OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot
24
Jun
2025

OPPO Clone Phone Vulnerability Leaks Sensitive Data via Weak WiFi Hotspot

A newly disclosed security vulnerability in OPPO’s widely used Clone Phone app has raised significant concerns over user privacy, as…