Category: GBHackers

Kimsuky and Konni APT Groups Lead Active Attacks Targeting East Asia
17
Jun
2025

Kimsuky and Konni APT Groups Lead Active Attacks Targeting East Asia

An significant 20 Advanced Persistent Threat (APT) occurrences were found in April 2025, according to a new report from Fuying…

Critical sslh Vulnerabilities Allow Remote Denial-of-Service Attacks
17
Jun
2025

Critical sslh Vulnerabilities Allow Remote Denial-of-Service Attacks

Security researchers disclosed two critical vulnerabilities in sslh, a widely used protocol multiplexer that enables multiple services—such as SSH, HTTPS,…

Water Curse Hacker Group Uses 76 GitHub Accounts to Spread Multistage Malware
17
Jun
2025

Water Curse Hacker Group Uses 76 GitHub Accounts to Spread Multistage Malware

A newly identified threat actor known as Water Curse has been linked to a sprawling campaign utilizing at least 76…

Critical Vulnerabilities in Sitecore Could Lead to Widespread Enterprise Attacks
17
Jun
2025

Critical Vulnerabilities in Sitecore Could Lead to Widespread Enterprise Attacks

A series of newly disclosed critical vulnerabilities in the Sitecore Experience Platform (XP) have raised alarm across the enterprise technology…

BeyondTrust Tools RCE Vulnerability Allows Attackers Execute Arbitrary Code
17
Jun
2025

BeyondTrust Tools RCE Vulnerability Allows Attackers Execute Arbitrary Code

A newly disclosed vulnerability in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) products has raised alarms across the…

Hackers Manipulate Search Engines to Push Malicious Sites
17
Jun
2025

Hackers Manipulate Search Engines to Push Malicious Sites

A new wave of cybercrime is exploiting the very backbone of internet trust: search engines. Recent research by Netcraft has…

Hackers Use Fake Verification Prompt and Clickfix Technique to Deploy Fileless AsyncRAT
17
Jun
2025

Hackers Use Fake Verification Prompt and Clickfix Technique to Deploy Fileless AsyncRAT

Threat actors are leveraging deceptive tactics to distribute a fileless variant of AsyncRAT, a notorious remote access Trojan. Discovered during…

WhatsApp’s Status Tab Set to Feature Ads as Meta Monetizes Platform
17
Jun
2025

WhatsApp’s Status Tab Set to Feature Ads as Meta Monetizes Platform

WhatsApp, the world’s most popular messaging app, is entering a new era as Meta officially begins rolling out advertisements within…

ASUS Armoury Crate Vulnerability Lets Hackers Gain System-Level Access on Windows
17
Jun
2025

ASUS Armoury Crate Vulnerability Lets Hackers Gain System-Level Access on Windows

A critical vulnerability in ASUS’s popular Armoury Crate software has exposed millions of Windows users to the risk of system-level…

Hackers Exploiting Chrome Zero‑Day Vulnerability in the Wild
17
Jun
2025

Hackers Exploiting Chrome Zero‑Day Vulnerability in the Wild

A newly discovered zero-day vulnerability in Google Chrome, tracked as CVE-2025-2783, is being actively exploited by hackers in sophisticated cyber-espionage…

150K+ Users Affected by Malicious Loan Apps on iOS and Google Play
17
Jun
2025

150K+ Users Affected by Malicious Loan Apps on iOS and Google Play

Over 150,000 users across Google Play and the Apple App Store have fallen victim to a malicious SpyLoan application named…

How Threat Actors Abuse OEM Permissions for Privilege Escalation
17
Jun
2025

How Threat Actors Abuse OEM Permissions for Privilege Escalation

Threat actors are increasingly exploiting legitimate channels to achieve privilege escalation, posing a severe risk to millions of devices worldwide….