Category: GBHackers

New Surge of Crypto-Jacking Hits Over 3,500 Websites
19
Jul
2025

New Surge of Crypto-Jacking Hits Over 3,500 Websites

Cybersecurity experts at cside have discovered a clever campaign that infected over 3,500 websites with nefarious JavaScript miners, marking a…

Chinese Threat Actors Operate 2,800 Malicious Domains to Distribute Windows Malware
18
Jul
2025

Chinese Threat Actors Operate 2,800 Malicious Domains to Distribute Windows Malware

A sophisticated threat actor, dubbed “SilverFox,” has been orchestrating a large-scale malware distribution campaign since at least June 2023, primarily…

New Veeam-Themed Phishing Attack Uses Weaponized WAV File to Target Users
18
Jul
2025

New Veeam-Themed Phishing Attack Uses Weaponized WAV File to Target Users

Cybercriminals are now leveraging seemingly innocuous voicemail notifications to distribute malware, with a recent campaign impersonating Veeam Software to exploit…

Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets
18
Jul
2025

Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets

Infostealers are specialized malware variants that routinely steal large amounts of sensitive data from compromised systems. This includes session tokens,…

Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools
18
Jul
2025

Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools

Fancy Bear, designated as APT28 by cybersecurity experts, represents a sophisticated Russian cyberespionage collective operational since 2007, renowned for infiltrating…

Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials
18
Jul
2025

Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials

Threat actors have been using a sophisticated phishing operation to impersonate Turkish Aerospace Industries (TUSAŞ) in order to attack Turkish…

Hackers Exploit ClickFix Tactics to Spread NetSupport RAT, Latrodectus, and Lumma Stealer
18
Jul
2025

Hackers Exploit ClickFix Tactics to Spread NetSupport RAT, Latrodectus, and Lumma Stealer

Attackers are increasingly leveraging the ClickFix social engineering technique to distribute potent malware families, including NetSupport RAT, Latrodectus, and Lumma…

Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon
18
Jul
2025

Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon

Threat actors have been actively exploiting vulnerabilities in Ivanti Connect Secure, specifically CVE-2025-0282 and CVE-2025-22457, to deploy advanced malware, including…

Microsoft Defender for Office 365 Gets Enhanced Threat Dashboard
18
Jul
2025

Microsoft Defender for Office 365 Gets Enhanced Threat Dashboard

Microsoft has announced significant transparency improvements for its email security platform, introducing a new customer-facing dashboard that provides detailed visibility…

Grafana Flaws Allow User Redirection and Code Execution in Dashboards
18
Jul
2025

Grafana Flaws Allow User Redirection and Code Execution in Dashboards

Grafana Labs has released critical security patches addressing two significant vulnerabilities that could enable attackers to redirect users to malicious…

Google Sues BadBox 2.0 Botnet Operators Behind 10 Million+ Infected Devices
18
Jul
2025

Google Sues BadBox 2.0 Botnet Operators Behind 10 Million+ Infected Devices

Google has initiated legal proceedings against the operators of BadBox 2.0, identified as the largest botnet comprising internet-connected televisions and…

Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution
18
Jul
2025

Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution

Sophos has disclosed three critical security vulnerabilities in its Intercept X for Windows endpoint security solution that could allow attackers…