Category: GBHackers

UNC3886 Hackers Target Singapore’s Critical Infrastructure by Exploiting 0-Day Vulnerabilities
28
Jul
2025

UNC3886 Hackers Target Singapore’s Critical Infrastructure by Exploiting 0-Day Vulnerabilities

Singapore’s critical infrastructure sectors, including energy, water, telecommunications, finance, and government services, are facing an active cyberattack from UNC3886, a…

Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info
28
Jul
2025

Raven Stealer Malware Exploits Telegram to Steal Logins, Payment Data, and Autofill Info

Raven Stealer has emerged as sophisticated, lightweight information-stealing malware crafted in Delphi and C++, targeting Windows systems with a focus…

Threat Actors Claim Breach of Airpay Payment Gateway
28
Jul
2025

Threat Actors Claim Breach of Airpay Payment Gateway

Cybercriminals have reportedly claimed a successful breach of Airpay, an Indian payment gateway service, raising serious concerns about the security…

Inside Laundry Bear: Unveiling Infrastructure, Tactics, and Procedures
28
Jul
2025

Inside Laundry Bear: Unveiling Infrastructure, Tactics, and Procedures

Dutch intelligence agencies AIVD and MIVD, alongside Microsoft Threat Intelligence, have identified Laundry Bear also tracked as Void Blizzard as…

Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception
28
Jul
2025

Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception

Malware-as-a-service (MaaS) platforms like PhantomOS and Nebula are democratizing Android device attacks because they provide pre-built, subscription-based malware kits for…

LLM Honeypots Deceive Hackers into Exposing Attack Methods
28
Jul
2025

LLM Honeypots Deceive Hackers into Exposing Attack Methods

Cybersecurity researchers have successfully deployed artificial intelligence-powered honeypots to trick cybercriminals into revealing their attack strategies, demonstrating a promising new…

NPM 'is' Package with 2.8M Weekly Downloads Exploited in Attack on Developers
28
Jul
2025

NPM ‘is’ Package with 2.8M Weekly Downloads Exploited in Attack on Developers

The popular npm package ‘is’, which has about 2.8 million weekly downloads, has been taken over by threat actors in…

Atomic macOS Stealer Upgraded with Remote Access Backdoor
28
Jul
2025

Atomic macOS Stealer Upgraded with Remote Access Backdoor

The Atomic macOS Stealer (AMOS), a notorious infostealer malware targeting Apple’s macOS ecosystem, has undergone a significant upgrade by incorporating…

Call Center Attacks for Initial Breach
28
Jul
2025

Call Center Attacks for Initial Breach

Palo Alto Networks’ Unit 42, the cybercrime group tracked as Muddled Libra also known as Scattered Spider or UNC3944 has…

400,000 WordPress Websites Exposed by Post SMTP Plugin Vulnerability
28
Jul
2025

400,000 WordPress Websites Exposed by Post SMTP Plugin Vulnerability

A critical security vulnerability has been discovered in the popular Post SMTP plugin for WordPress, potentially exposing over 400,000 websites…

Hackers Breach Intelligence Portal Used by the CIA and Other Agencies
28
Jul
2025

Hackers Breach Intelligence Portal Used by the CIA and Other Agencies

Unidentified hackers have successfully compromised a critical intelligence website operated by the National Reconnaissance Office, marking a significant security breach…

New “ToolShell” Exploit Targets SharePoint Servers for Full Takeover
28
Jul
2025

New “ToolShell” Exploit Targets SharePoint Servers for Full Takeover

FortiGuard Labs has identified a critical new exploit chain dubbed “ToolShell” that is actively being used by multiple threat actors…