Category: GBHackers

Stellantis Confirms Data Breach Affecting Citroën, Fiat, Jeep, and More
22
Sep
2025

Stellantis Confirms Data Breach Affecting Citroën, Fiat, Jeep, and More

Automotive giant Stellantis has confirmed a significant data breach affecting its North American customer service operations, potentially impacting customers across…

BlockBlasters Steam Game Disguises Malware as Patch for Computer Download
22
Sep
2025

BlockBlasters Steam Game Disguises Malware as Patch for Computer Download

BlockBlasters, a vibrant 2D platformer/shooter from Genesis Interactive, launched on July 31, 2025 to wide acclaim. However, on August 30,…

Threat Actors Exploit Oracle Database Scheduler to Infiltrate Corporate Networks
22
Sep
2025

Threat Actors Exploit Oracle Database Scheduler to Infiltrate Corporate Networks

Threat actors have begun exploiting the Oracle Database Scheduler’s External Jobs feature to execute arbitrary commands on corporate database servers,…

Code Analysis Published for Chrome Type Confusion 0-Day Vulnerability
22
Sep
2025

Code Analysis Published for Chrome Type Confusion 0-Day Vulnerability

Google Chrome’s V8 JavaScript engine has long balanced speed and security for billions of users worldwide. On September 16, 2025,…

God Mode Vulnerability Lets Attackers Access Any Resource in Microsoft Cloud Tenants
22
Sep
2025

God Mode Vulnerability Lets Attackers Access Any Resource in Microsoft Cloud Tenants

A recently disclosed flaw, tracked as CVE-2025-55241, allowed any attacker in possession of a single “Actor token” from a test…

Canada Police Shuts Down TradeOgre After $56M Crypto Theft
22
Sep
2025

Canada Police Shuts Down TradeOgre After $56M Crypto Theft

Montréal, Quebec, September 18, 2025 – In an unprecedented operation, the Royal Canadian Mounted Police (RCMP) Federal Policing – Eastern…

17,500 Phishing Domains Mimic 316 Global Brands
22
Sep
2025

17,500 Phishing Domains Mimic 316 Global Brands

Cybersecurity researchers at Netcraft have uncovered two sophisticated phishing campaigns linked to the Lucid and Lighthouse Phishing-as-a-Service (PhaaS) platforms, revealing…

Threat Actors Fake FBI IC3 Portal to Steal Visitor Information
22
Sep
2025

Threat Actors Fake FBI IC3 Portal to Steal Visitor Information

The Federal Bureau of Investigation has issued a critical public service announcement warning citizens about cybercriminals creating sophisticated spoofed versions…

Cybercriminals Exploit ICS Computers via Scripts and Phishing Attacks
22
Sep
2025

Cybercriminals Exploit ICS Computers via Scripts and Phishing Attacks

Industrial control systems (ICS) continue to face increasing cybersecurity challenges as threat actors employ sophisticated malicious scripts and phishing campaigns…

Hackers Abuse GitHub Pages to Spread Stealer Malware to macOS Users
22
Sep
2025

Hackers Abuse GitHub Pages to Spread Stealer Malware to macOS Users

A sophisticated malware campaign is targeting Mac users through fraudulent GitHub repositories that masquerade as legitimate software downloads, with threat…

Attackers Bypass Windows "Mark of the Web" Protections Using LNK-Stomping
22
Sep
2025

Attackers Bypass Windows “Mark of the Web” Protections Using LNK-Stomping

A sophisticated attack technique called LNK Stomping is enabling cybercriminals to bypass Windows security protections designed to block malicious files downloaded from…

Threat Actors Market Stealthy New RAT as Alternative to ScreenConnect FUD
22
Sep
2025

Threat Actors Market Stealthy New RAT as Alternative to ScreenConnect FUD

Cybersecurity researchers have identified a concerning development in the underground cybercrime marketplace: a sophisticated Remote Access Trojan (RAT) being marketed…