Category: GBHackers

SquidLoader Deploys Stealthy Malware with Near-Zero Detection to Evade Security Measures
17
Jul
2025

SquidLoader Deploys Stealthy Malware with Near-Zero Detection to Evade Security Measures

A fresh variant of SquidLoader malware has surfaced, actively entering Hong Kong institutions with previously unheard-of stealth, which is alarming…

Cracked Apps Delivering Infostealers Identified as Leading Attack Vector in June 2025
16
Jul
2025

Cracked Apps Delivering Infostealers Identified as Leading Attack Vector in June 2025

The AhnLab Security Intelligence Center (ASEC) published a thorough analysis in June 2025 that identified infostealer malware masquerading as keygens…

Hackers Leverage 607 Malicious Domains to Spread APK Malware with Remote Command Execution
16
Jul
2025

Hackers Leverage 607 Malicious Domains to Spread APK Malware with Remote Command Execution

PreCrime Labs at BforeAI discovered a complex cyber threat operation in which hackers have used a vast network of 607…

Threat Actors Weaponize WordPress Sites to Redirect Visitors to Malicious Domains
16
Jul
2025

Threat Actors Weaponize WordPress Sites to Redirect Visitors to Malicious Domains

Security researchers identified a sophisticated malware campaign targeting WordPress websites, where threat actors embedded malicious code within core files to…

NimDoor MacOS Malware Abuses Zoom SDK Updates to Steal Keychain Credentials
16
Jul
2025

NimDoor MacOS Malware Abuses Zoom SDK Updates to Steal Keychain Credentials

SentinelOne researchers have discovered NimDoor, a sophisticated MacOS malware campaign ascribed to North Korean-affiliated attackers, most likely the Stardust Chollima…

Gmail Message Exploit Triggers Code Execution in Claude, Bypassing Protections
16
Jul
2025

Gmail Message Exploit Triggers Code Execution in Claude, Bypassing Protections

A cybersecurity researcher has demonstrated how a carefully crafted Gmail message can trigger code execution through Claude Desktop, Anthropic’s AI…

Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services
16
Jul
2025

Dark Partners Hacker Group Drains Crypto Wallets Using Fake AI Tools and VPN Services

The financially driven organization known as Dark Partners has been planning massive cryptocurrency theft since at least May 2025, using…

Windows Secure Boot Certificate Expired in June, Microsoft Issues Warning
16
Jul
2025

Windows Secure Boot Certificate Expired in June, Microsoft Issues Warning

Microsoft has issued an urgent warning to Windows users about an impending security certificate expiration that could significantly impact device…

Chinese 'Salt Typhoon' Hackers Infiltrated US National Guard Network for Almost a Year
16
Jul
2025

Chinese ‘Salt Typhoon’ Hackers Infiltrated US National Guard Network for Almost a Year

The Department of Defense (DoD) revealed that an advanced persistent threat (APT) group, known as Salt Typhoon and publicly identified…

Lenovo Vantage Flaws Enable Attackers to Gain SYSTEM-Level Privileges
16
Jul
2025

Lenovo Vantage Flaws Enable Attackers to Gain SYSTEM-Level Privileges

Security researchers at Atredis have uncovered multiple privilege escalation vulnerabilities in Lenovo Vantage, a pre-installed management platform on Lenovo laptops…

Samsung WLAN AP Flaws Let Remote Attackers Run Commands as Root
16
Jul
2025

Samsung WLAN AP Flaws Let Remote Attackers Run Commands as Root

Security researchers have uncovered a critical chain of vulnerabilities in Samsung’s WEA453e wireless access point that allows unauthenticated remote attackers…

Google’s AI ‘Big Sleep’ Detects Critical SQLite 0-Day, Halts Ongoing Attacks
16
Jul
2025

Google’s AI ‘Big Sleep’ Detects Critical SQLite 0-Day, Halts Ongoing Attacks

Google’s artificial intelligence agent “Big Sleep” has made cybersecurity history by discovering and stopping the exploitation of a critical zero-day…