Category: GBHackers

Google Mandates License or Certification for Crypto App Developers
14
Aug
2025

Google Mandates License or Certification for Crypto App Developers

The cryptocurrency ecosystem is experiencing heightened scrutiny from both regulatory authorities and criminal organizations, as Google Play implements stringent publishing…

Qilin Ransomware Dominates July with Over 70 Claimed Victims
14
Aug
2025

Qilin Ransomware Dominates July with Over 70 Claimed Victims

The Qilin ransomware group has solidified its position as the most active threat actor in July 2025, marking its third…

'AI Induced Destruction' - How AI Misuse is Creating New Attack Vectors
14
Aug
2025

‘AI Induced Destruction’ – How AI Misuse is Creating New Attack Vectors

Cybersecurity firms are reporting a disturbing new trend in 2025: artificial intelligence assistants designed to boost productivity are inadvertently becoming…

Windows Out-of-Box-Experience Flaw Enables Full Administrative Command Prompt Access
14
Aug
2025

Windows Out-of-Box-Experience Flaw Enables Full Administrative Command Prompt Access

A newly documented vulnerability in Windows’ Out-of-Box-Experience (OOBE) allows users to bypass security restrictions and gain full administrative access to…

FireWood Malware Targets Linux Systems for Command Execution and Data Theft
14
Aug
2025

FireWood Malware Targets Linux Systems for Command Execution and Data Theft

Intezer’s Research Team has uncovered a new, low-detection variant of the FireWood backdoor, a sophisticated Linux-based remote access trojan (RAT)…

CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders
14
Aug
2025

CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with eight other national cyber agencies, has released a comprehensive “Foundations…

Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution
14
Aug
2025

Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution

Microsoft has disclosed a critical security vulnerability in its Internet Information Services (IIS) Web Deploy tool that could allow attackers…

EncryptHub Turns Brave Support Into a Dropper; MMC Flaw Completes the Run
14
Aug
2025

EncryptHub Turns Brave Support Into a Dropper; MMC Flaw Completes the Run

Trustwave SpiderLabs researchers have uncovered a sophisticated EncryptHub campaign that ingeniously abuses the Brave Support platform to deliver malicious payloads,…

Splunk Publishes Defender’s Guide to Spot ESXi Ransomware Early
14
Aug
2025

Splunk Publishes Defender’s Guide to Spot ESXi Ransomware Early

Splunk has released a comprehensive defender’s guide aimed at helping cybersecurity teams detect and prevent ransomware attacks targeting ESXi infrastructure…

Attackers Need Just One Vulnerability to Own Your Rooted Android
14
Aug
2025

Attackers Need Just One Vulnerability to Own Your Rooted Android

Android privilege escalation has been transformed by rooting frameworks such as KernelSU, APatch, and SKRoot, which use advanced kernel patching…

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services
14
Aug
2025

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services

The AhnLab Security Intelligence Center (ASEC) has uncovered fresh instances of proxyware distribution by threat actors leveraging deceptive advertising on…

Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution
14
Aug
2025

Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution

A severe security vulnerability has been discovered in a popular WordPress plugin used by over 70,000 websites worldwide, potentially exposing…