Category: GBHackers

Help TDS Hacks Legitimate Websites, Using PHP Templates to Display Fake Microsoft Security Alerts
22
Aug
2025

Help TDS Hacks Legitimate Websites, Using PHP Templates to Display Fake Microsoft Security Alerts

GoDaddy Security researchers have unveiled a detailed analysis of Help TDS, a sophisticated Traffic Direction System operational since at least…

BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics
22
Aug
2025

BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics

Ransomware-as-a-Service (RaaS) models continue to democratize sophisticated attacks in the ever-changing world of cybercrime by allowing affiliates with little technical…

Lumma Operators Deploy Cutting-Edge Evasion Tools to Maintain Stealth and Persistence
22
Aug
2025

Lumma Operators Deploy Cutting-Edge Evasion Tools to Maintain Stealth and Persistence

Lumma infostealer affiliates’ complex operating framework was revealed by Insikt Group in a ground-breaking report published on August 22, 2025,…

Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS
22
Aug
2025

Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS

Microsoft Threat Intelligence has spotlighted the escalating adoption of the ClickFix social engineering technique, a sophisticated method that manipulates users…

Android Under Siege as Hackers Harvest Credentials and Track Keystrokes
22
Aug
2025

Android Under Siege as Hackers Harvest Credentials and Track Keystrokes

The Zscaler ThreatLabz team has uncovered significant advancements in the Anatsa malware, also known as TeaBot, an Android banking trojan…

CISA Warns of Actively Exploited 0-Day Vulnerability in Apple iOS, iPadOS, and macOS
22
Aug
2025

CISA Warns of Actively Exploited 0-Day Vulnerability in Apple iOS, iPadOS, and macOS

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical zero-day vulnerability affecting Apple iOS,…

AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes
22
Aug
2025

AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes

Cybersecurity researchers have developed an artificial intelligence system capable of automatically generating working exploits for published Common Vulnerabilities and Exposures…

Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools
22
Aug
2025

Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools

Cyber threat actors have launched sophisticated phishing operations aimed at military and government personnel in South Asia, leveraging defense-related lures…

14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks
22
Aug
2025

14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks

A critical security vulnerability has been discovered in the widely-used sha.js npm package, exposing millions of applications to sophisticated hash…

UAC-0057 Leveraging Invitations to Trigger Shell Script Attacks
22
Aug
2025

UAC-0057 Leveraging Invitations to Trigger Shell Script Attacks

The Belarusian-affiliated threat actor UAC-0057, also known as UNC1151, FrostyNeighbor, or Ghostwriter, has been using weaponized archives that contain phony…

Weaponized RAR Files Deliver VShell Backdoor on Linux Systems
22
Aug
2025

Weaponized RAR Files Deliver VShell Backdoor on Linux Systems

Trellix Advanced Research Center has exposed an infection chain that weaponises nothing more than a filename to compromise Linux hosts….

Azure Default API Connection Flaw Enables Full Cross-Tenant Compromise
22
Aug
2025

Azure Default API Connection Flaw Enables Full Cross-Tenant Compromise

A critical security vulnerability in Microsoft Azure’s API Connection architecture has been discovered that could allow attackers to completely compromise…