Category: GBHackers

New Web3 Phishing Scam Uses Fake AI Platforms to Steal Credentials
22
Jul
2025

New Web3 Phishing Scam Uses Fake AI Platforms to Steal Credentials

The threat actor group LARVA-208, notorious for phishing attacks and social engineering against English-speaking IT staff, has pivoted to targeting…

Iranian Hackers Target Global Airlines to Steal Sensitive Data
22
Jul
2025

Iranian Hackers Target Global Airlines to Steal Sensitive Data

APT39, a hacker collective connected to Iran’s Ministry of Intelligence and Security (MOIS), was exposed as operating through the compromised…

Scavenger Malware Compromises Popular npm Packages to Target Developers
22
Jul
2025

Scavenger Malware Compromises Popular npm Packages to Target Developers

The well-known npm package eslint-config-prettier was released without authorization, according to several GitHub users, even though its repository did not…

ETQ Reliance RCE Flaw Grants Full SYSTEM Access with a Single Space
22
Jul
2025

ETQ Reliance RCE Flaw Grants Full SYSTEM Access with a Single Space

Hexagon ETQ’s Java-based quality management system, ETQ Reliance, has several serious flaws, according to a new security research revelation by…

Threat Actors Target Linux SSH Servers to Deploy SVF Botnet
22
Jul
2025

Threat Actors Target Linux SSH Servers to Deploy SVF Botnet

AhnLab Security Intelligence Center (ASEC) has been actively tracking cyber threats exploiting vulnerable Linux servers through strategically deployed honeypots, with…

ClickFake Interview Attack Leverages ClickFix Technique to Deploy GolangGhost Malware
22
Jul
2025

ClickFake Interview Attack Leverages ClickFix Technique to Deploy GolangGhost Malware

Cybersecurity researchers have provided insight into a persistent threat cluster linked to the well-known North Korean state-sponsored hacker outfit Lazarus,…

UK Bans Public Sector from Paying Ransomware Gangs
22
Jul
2025

UK Bans Public Sector from Paying Ransomware Gangs

The UK government has announced a comprehensive ban preventing public sector organizations from paying ransom demands to cybercriminals, marking a…

Hackers Selling macOS 0-Day LPE Exploit on Dark Forums
22
Jul
2025

Hackers Selling macOS 0-Day LPE Exploit on Dark Forums

A threat actor claiming to possess a zero-day Local Privilege Escalation (LPE) exploit targeting Apple’s macOS operating system has emerged…

Cisco Alerts on ISE RCE Vulnerability Actively Exploited
22
Jul
2025

Cisco Alerts on ISE RCE Vulnerability Actively Exploited

Cisco has issued an urgent security advisory warning that a set of critical remote code execution (RCE) vulnerabilities affecting its…

New DCHSpy Android Malware Targets WhatsApp, Call Logs, Audio, and Photos
22
Jul
2025

New DCHSpy Android Malware Targets WhatsApp, Call Logs, Audio, and Photos

Security researchers at Lookout have identified four novel samples of DCHSpy, an advanced Android surveillanceware attributed to the Iranian threat…

wolfSSL Security Update Addresses Apple Trust Store Bypass
22
Jul
2025

wolfSSL Security Update Addresses Apple Trust Store Bypass

wolfSSL has released version 5.8.2 to address several critical security vulnerabilities, with the most significant being a high-severity Apple trust…

Dark Web Travel Agencies Exploit Cheap Deals to Steal Credit Card Data
22
Jul
2025

Dark Web Travel Agencies Exploit Cheap Deals to Steal Credit Card Data

Dark web travel agencies have developed into highly skilled organizations operating in the murky corners of cybercrime, using hacked credit…