Category: GBHackers

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry
03
Feb
2025

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

The Indonesian hacker group “INDOHAXSEC” has allegedly breached the National Tuberculosis Registry (NTBR) of Malaysia, managed by the Ministry of…

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users
31
Jan
2025

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of the largest hacking forums globally—Cracked.io and…

Critical D-Link Router Flaw Allows Attackers to Take Full Remote Control
31
Jan
2025

Critical D-Link Router Flaw Allows Attackers to Take Full Remote Control

A critical unauthenticated Remote Code Execution (RCE) vulnerability has been identified in D-Link’s DSL-3788 routers, specifically hardware revisions Ax/Bx running…

Microsoft Enhances Windows 11 Security with Admin Protection to Prevent Crowdstrike-Like Incident
31
Jan
2025

Microsoft Enhances Windows 11 Security with Admin Protection to Prevent Crowdstrike-Like Incident

Microsoft has introduced “Administrator Protection” (AP), a sophisticated security feature aimed at elevating Windows operating system security by redefining how…

Doppler Announces Integration with Datadog to Streamline Security and Monitoring
31
Jan
2025

Doppler Announces Integration with Datadog to Streamline Security and Monitoring

Doppler, the leading provider of secrets management solutions, announced a new integration with Datadog, a cloud application monitoring and security…

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems
30
Jan
2025

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems

A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored cyberespionage operation, tracked as CL-STA-0048….

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials.
30
Jan
2025

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials.

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed to exploit tax filing season….

Files Locked, Backups Erased, and Remote Access Disabled
30
Jan
2025

Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated threat. This Ransomware-as-a-Service (RaaS) operation,…

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages
30
Jan
2025

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed “Tria Stealer,” which exploits fake wedding invitations…

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments
30
Jan
2025

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed by cybersecurity researchers. Introduced by…

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability
30
Jan
2025

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass, is facing scrutiny after the…

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware
30
Jan
2025

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS and Windows users. Researchers revealed this…