Category: GBHackers

Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability
30
Jan
2025

Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability

In a critical development within the AI industry, researchers at Noma Security have disclosed the discovery of a high-severity Remote…

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks
30
Jan
2025

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks

Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in government websites to further phishing campaigns….

Hackers Sell Compromised Emails and Google Ads Accounts on Dark Web
30
Jan
2025

Hackers Sell Compromised Emails and Google Ads Accounts on Dark Web

A new wave of cybercrime is surfacing as hackers exploit compromised emails and digital advertising platforms to create a thriving…

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device
30
Jan
2025

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate and far-reaching operation of the Lazarus…

CISA Releases Seven ICS Advisories to Strengthen Cybersecurity Posture
30
Jan
2025

CISA Releases Seven ICS Advisories to Strengthen Cybersecurity Posture

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued seven Industrial Control Systems (ICS) advisories, highlighting critical vulnerabilities in…

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely
30
Jan
2025

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has been identified as an operation spearheaded…

TeamViewer Clients Vulnerability Leads to Privilege Escalation
30
Jan
2025

TeamViewer Clients Vulnerability Leads to Privilege Escalation

TeamViewer, a widely used remote access software, has announced a critical vulnerability in its Windows clients. The company disclosed on…

Tria Stealer Malware Exploits Android Devices to Harvest SMS Data
30
Jan
2025

Tria Stealer Malware Exploits Android Devices to Harvest SMS Data

Cybersecurity researchers have uncovered a sophisticated Android malware campaign known as “Tria Stealer,” which is targeting users in Malaysia and…

A new Infostealer Attacking Chrome & Mozilla Users
29
Jan
2025

A new Infostealer Attacking Chrome & Mozilla Users

A newly identified strain of information-stealing malware, FleshStealer, is making headlines in 2025 due to its advanced evasion techniques and…

Hellcat ransomware Attacking government organizations & educational institutions
29
Jan
2025

Hellcat ransomware Attacking government organizations & educational institutions

A new ransomware gang, Hellcat, emerged on dark web forums in 2024, targeting critical infrastructure, government organizations, educational institutions, and…

A Security Loophole in WhatsApp’s “View Once” Mode
29
Jan
2025

A Security Loophole in WhatsApp’s “View Once” Mode

Privacy is the cornerstone of digital communication in today’s world, and platforms like WhatsApp consistently introduce features to enhance user…

Hackers Attacking Windows, macOS, and Linux systems With SparkRAT
29
Jan
2025

Hackers Attacking Windows, macOS, and Linux systems With SparkRAT

Researchers have uncovered new developments in SparkRAT operations, shedding light on its persistent use in malicious campaigns targeting macOS users…