Category: GBHackers

Malicious npm Packages Target Crypto Developers to Steal Login Credentials
19
Aug
2025

Malicious npm Packages Target Crypto Developers to Steal Login Credentials

A sophisticated threat campaign dubbed “Solana-Scan” has emerged, deploying malicious npm packages aimed at infiltrating the Solana cryptocurrency ecosystem. Identified…

CISA Alerts on Active Exploitation of Trend Micro Apex One Vulnerability
19
Aug
2025

CISA Alerts on Active Exploitation of Trend Micro Apex One Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Trend Micro Apex One vulnerability to its Known Exploited…

Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters
19
Aug
2025

Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters

Cybercriminals have discovered a sophisticated new attack vector that weaponizes Cisco’s security infrastructure against users, according to recent research from…

Intel Websites Compromised, Allowing Hackers Access to Employee Data
19
Aug
2025

Intel Websites Compromised, Allowing Hackers Access to Employee Data

A series of critical security flaws in Intel’s internal web infrastructure exposed the personal details of more than 270,000 employees…

Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers
19
Aug
2025

Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage pirated game downloads to distribute HijackLoader, a modular malware…

Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan
18
Aug
2025

Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan

Pakistan’s National Cyber Emergency Response Team (NCERT) has issued a high-alert advisory to 39 key ministries and institutions, warning of…

Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware
18
Aug
2025

Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage a Microsoft Help Index File (.mshi) to deploy the…

Weaponized Python Package "termncolor" Uses Windows Run Key for Persistence
18
Aug
2025

Weaponized Python Package “termncolor” Uses Windows Run Key for Persistence

Cybersecurity experts discovered a complex supply chain attack that originated from the Python Package Index (PyPI) in a recent disclosure…

Threat Actors Exploit Telegram as the Communication Channel to Exfiltrate Stolen Data
18
Aug
2025

Threat Actors Exploit Telegram as the Communication Channel to Exfiltrate Stolen Data

tLab Technologies, a Kazakhstan-based company that specializes in advanced threat prevention, discovered one of the first known phishing attempts in…

Technical Details of SAP 0-Day Exploitation Script for RCE Revealed
18
Aug
2025

Technical Details of SAP 0-Day Exploitation Script for RCE Revealed

Cybersecurity researchers have unveiled the inner workings of an exploit script targeting a critical zero-day vulnerability in SAP NetWeaver’s Visual…

Linux Kernel Netfilter Flaw Enables Privilege Escalation
18
Aug
2025

Linux Kernel Netfilter Flaw Enables Privilege Escalation

A critical vulnerability in the Linux kernel’s netfilter subsystem has been discovered that allows local attackers to escalate privileges through…

DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group
18
Aug
2025

DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group

The Department of Justice has announced a significant victory against cybercriminals, seizing over $2.8 million in cryptocurrency and additional assets…