Category: GBHackers

Coyote Malware Targets WILS, Abusing Microsoft UI Automation to Exfiltrate Logins
23
Jul
2025

Coyote Malware Targets WILS, Abusing Microsoft UI Automation to Exfiltrate Logins

Akamai security researchers have uncovered a novel variant of the Coyote banking trojan that marks the inaugural documented instance of…

Ransomware Groups Weaponize RMM Tools to Infiltrate Networks and Exfiltrate Data
23
Jul
2025

Ransomware Groups Weaponize RMM Tools to Infiltrate Networks and Exfiltrate Data

Ransomware gangs have increasingly co-opted Remote Monitoring and Management (RMM) tools originally designed for IT operations to orchestrate sophisticated network…

Chrome High-Severity Vulnerabilities Allow Hackers to Gain Full Control
23
Jul
2025

Chrome High-Severity Vulnerabilities Allow Hackers to Gain Full Control

Google has released an urgent security update for Chrome, addressing critical vulnerabilities that could potentially allow attackers to gain complete…

Kali Linux Introduces Two New Tools for Raspberry Pi to Boost Wi-Fi Performance
23
Jul
2025

Kali Linux Introduces Two New Tools for Raspberry Pi to Boost Wi-Fi Performance

Kali Linux maintainers have unveiled two new packages designed to unleash the full potential of the Raspberry Pi’s onboard wireless…

Mozilla Launches Firefox 141 With Critical Security Fixes – Update Immediately
23
Jul
2025

Mozilla Launches Firefox 141 With Critical Security Fixes – Update Immediately

Mozilla has today released Firefox 141, addressing a broad spectrum of security vulnerabilities that range from high-impact memory safety bugs…

Hackers Injected Malicious Firefox Packages in Arch Linux Repo
23
Jul
2025

Hackers Injected Malicious Firefox Packages in Arch Linux Repo

Cybersecurity researchers have identified a sophisticated supply chain attack targeting Arch Linux users through malicious packages designed to masquerade as…

CISA Alerts on Active Exploitation of Microsoft SharePoint Code Injection and Authentication Vulnerabilities
23
Jul
2025

CISA Alerts on Active Exploitation of Microsoft SharePoint Code Injection and Authentication Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued urgent alerts regarding the active exploitation of two critical Microsoft SharePoint…

Apache Jena Vulnerability Allows Arbitrary File Access
22
Jul
2025

Apache Jena Vulnerability Allows Arbitrary File Access

Critical security vulnerabilities in Apache Jena have been disclosed that enable administrators to access and create files outside designated server…

New Web3 Phishing Scam Uses Fake AI Platforms to Steal Credentials
22
Jul
2025

New Web3 Phishing Scam Uses Fake AI Platforms to Steal Credentials

The threat actor group LARVA-208, notorious for phishing attacks and social engineering against English-speaking IT staff, has pivoted to targeting…

Iranian Hackers Target Global Airlines to Steal Sensitive Data
22
Jul
2025

Iranian Hackers Target Global Airlines to Steal Sensitive Data

APT39, a hacker collective connected to Iran’s Ministry of Intelligence and Security (MOIS), was exposed as operating through the compromised…

Scavenger Malware Compromises Popular npm Packages to Target Developers
22
Jul
2025

Scavenger Malware Compromises Popular npm Packages to Target Developers

The well-known npm package eslint-config-prettier was released without authorization, according to several GitHub users, even though its repository did not…

ETQ Reliance RCE Flaw Grants Full SYSTEM Access with a Single Space
22
Jul
2025

ETQ Reliance RCE Flaw Grants Full SYSTEM Access with a Single Space

Hexagon ETQ’s Java-based quality management system, ETQ Reliance, has several serious flaws, according to a new security research revelation by…