Category: GBHackers

iOS Zero Click Flaw Actively Exploited
17
Jun
2025

iOS Zero Click Flaw Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert following the discovery and active exploitation of…

GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone
17
Jun
2025

GCHQ Intern Sentenced to 7 Years for Illegally Copying Secret Files to Smartphone

A former intern at the UK’s intelligence agency GCHQ has been sentenced to seven and a half years in prison…

Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks
17
Jun
2025

Apache Tomcat Flaws Allow Auth Bypass and DoS Attacks

The Apache Software Foundation has released critical security updates to address four newly discovered vulnerabilities in Apache Tomcat, one of…

Zyxel Devices Under Attack as Hackers Exploit UDP Port RCE Flaw
17
Jun
2025

Zyxel Devices Under Attack as Hackers Exploit UDP Port RCE Flaw

A sudden and highly coordinated wave of cyberattacks has struck Zyxel firewall and VPN devices worldwide, as hackers exploit a…

Malicious Payload Found in JPEG Image Using Steganography and Base64 Obfuscation
16
Jun
2025

Malicious Payload Found in JPEG Image Using Steganography and Base64 Obfuscation

Cybersecurity enthusiast Xavier shed light on a sophisticated method of hiding malicious payloads within seemingly innocuous JPEG images. This discovery…

Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS Tokens and Sensitive Data
16
Jun
2025

Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS Tokens and Sensitive Data

The JFrog Security Research team has uncovered a sophisticated malicious package named “chimera-sandbox-extensions” on the Python Package Index (PyPI), a…

Katz Stealer Boosts Credential Theft with System Fingerprinting and Persistence Mechanisms
16
Jun
2025

Katz Stealer Boosts Credential Theft with System Fingerprinting and Persistence Mechanisms

The emergence of Katz Stealer, a sophisticated information-stealing malware-as-a-service (MaaS) that is redefining the boundaries of credential theft. First detected…

Washington Post Hacked - Multiple Journalists’ Email Accounts Compromised
16
Jun
2025

Washington Post Hacked – Multiple Journalists’ Email Accounts Compromised

The Washington Post confirmed late last week that its email systems were targeted in a cyberattack, resulting in the compromise…

North Korean APT Hackers Target Ukrainian Government Agencies to Steal Login Credentials
16
Jun
2025

North Korean APT Hackers Target Ukrainian Government Agencies to Steal Login Credentials

North Korean Advanced Persistent Threat (APT) hackers, specifically the Konni group, have shifted their focus to Ukrainian government agencies in…

Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services
16
Jun
2025

Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services

Calgary-based WestJet Airlines, Canada’s second-largest carrier, is grappling with the fallout from a significant cybersecurity incident that has disrupted access…

BERT Ransomware Escalates Attacks on Linux Machines with Weaponized ELF Files
16
Jun
2025

BERT Ransomware Escalates Attacks on Linux Machines with Weaponized ELF Files

The BERT ransomware group, first detected in April 2025 but active since mid-March, has expanded its reach from targeting Windows…

Hackers Target and Hijack Washington Post Journalists’ Email Accounts
16
Jun
2025

Hackers Target and Hijack Washington Post Journalists’ Email Accounts

A targeted cyberattack has struck The Washington Post, compromising the email accounts of several of its journalists and raising new…