Category: GBHackers

Phishing Campaigns Exploit RMM Tools to Sustain Remote Access
15
Sep
2025

Phishing Campaigns Exploit RMM Tools to Sustain Remote Access

A sophisticated phishing operation in which attackers deploy remote monitoring and management (RMM) tools—ITarian (formerly Comodo), PDQ Connect, SimpleHelp, and…

Sidewinder Hackers Weaponize Nepal Protests to Spread Cross-Platform Malware
15
Sep
2025

Sidewinder Hackers Weaponize Nepal Protests to Spread Cross-Platform Malware

Sidewinder, a well-known advanced persistent threat (APT) group, has adapted its tactics to exploit the ongoing protests in Nepal, deploying…

Pro-Russian Hackers Target Critical Industries Across the Globe
15
Sep
2025

Pro-Russian Hackers Target Critical Industries Across the Globe

In 2024, as the Russia-Ukraine war prolongs and military and economic cooperation between North Korea and Russia deepens, cyberspace has…

Burger King Uses DMCA to Remove Blog Exposing Drive-Thru System Security Flaws
15
Sep
2025

Burger King Uses DMCA to Remove Blog Exposing Drive-Thru System Security Flaws

Burger King has invoked the Digital Millennium Copyright Act to force the removal of a security researcher’s blog post that…

IBM QRadar SIEM Vulnerability Allows Unauthorized Actions by Attackers
15
Sep
2025

IBM QRadar SIEM Vulnerability Allows Unauthorized Actions by Attackers

A permissions issue in IBM QRadar SIEM could enable local privileged users to modify configuration files without proper authorization. Tracked…

LangChainGo Vulnerability Allows Malicious Prompt Injection to Access Sensitive Data
15
Sep
2025

LangChainGo Vulnerability Allows Malicious Prompt Injection to Access Sensitive Data

A recently discovered flaw in LangChainGo, the Go implementation of the LangChain framework for large language models, permits attackers to…

Hackers using generative AI “ChatGPT” to evade anti-virus defenses
15
Sep
2025

Hackers using generative AI “ChatGPT” to evade anti-virus defenses

The Kimsuky APT group has begun leveraging generative AI ChatGPT to craft deepfake South Korean military agency ID cards. Phishing…

BlackNevas Ransomware Encrypts Files, Exfiltrates Corporate Data
15
Sep
2025

BlackNevas Ransomware Encrypts Files, Exfiltrates Corporate Data

Countries with most cyberattacks stopped highlighting global cyber defense efforts, including key regions in Asia-Pacific and North America.  BlackNevas has…

FBI Releases IOCs on Cyber Threats Exploiting Salesforce for Data Theft
15
Sep
2025

FBI Releases IOCs on Cyber Threats Exploiting Salesforce for Data Theft

The Federal Bureau of Investigation (FBI) has released a detailed flash advisory disclosing indicators of compromise (IOCs) and tactics used…

AppSuite-PDF, PDF Editor Operators Exploited 26 Code-Signing Certificates to Fake Legitimacy
15
Sep
2025

AppSuite-PDF, PDF Editor Operators Exploited 26 Code-Signing Certificates to Fake Legitimacy

Analysis reveals that the developers behind the AppSuite-PDF and PDF Editor campaigns have abused at least 26 distinct code-signing certificates…

Microsoft Warns Windows 11 23H2 Support Ending in 60 Days
15
Sep
2025

Microsoft Warns Windows 11 23H2 Support Ending in 60 Days

Microsoft has issued an urgent reminder to enterprise and educational institutions worldwide about the impending end of support for Windows…

Yurei Ransomware Uses PowerShell to Deploy ChaCha20 File Encryption
15
Sep
2025

Yurei Ransomware Uses PowerShell to Deploy ChaCha20 File Encryption

A newly discovered ransomware group called Yurei has emerged with sophisticated encryption capabilities, targeting organizations through double-extortion tactics while leveraging…