Category: GBHackers

The Emerging Technique Threat Actors Use to Dominate Targeted Organizations
12
Jul
2025

The Emerging Technique Threat Actors Use to Dominate Targeted Organizations

Threat actors have increasingly adopted ClickFix, a sophisticated social engineering technique that deceives users into executing malicious commands under the…

Thermomix TM5 Vulnerabilities Enable Remote Takeover by Attackers
12
Jul
2025

Thermomix TM5 Vulnerabilities Enable Remote Takeover by Attackers

Researchers have uncovered multiple vulnerabilities in the Thermomix TM5, a multifunctional kitchen appliance from Vorwerk, allowing attackers to potentially achieve…

OpenAI Set to Launch AI-Powered Web Browser in the Coming Weeks
12
Jul
2025

OpenAI Set to Launch AI-Powered Web Browser in the Coming Weeks

OpenAI is on the cusp of introducing a groundbreaking AI-infused web browser, slated for release in the imminent weeks, as…

Hackers Compromise WordPress GravityForms Plugin with Malicious Code Injection
12
Jul
2025

Hackers Compromise WordPress GravityForms Plugin with Malicious Code Injection

Hackers have targeted the popular WordPress plugin Gravity Forms, injecting malicious code into versions downloaded from the official gravityforms.com domain….

Hacker Returns $42 Million in Stolen Crypto in Exchange for $5 Million Bounty
12
Jul
2025

Hacker Returns $42 Million in Stolen Crypto in Exchange for $5 Million Bounty

A security flaw in the GMX V1 software was made public, causing a significant upheaval in the decentralized finance (DeFi)…

Microsoft Broadens Zero Trust Training to Address Network and SecOps Domains
12
Jul
2025

Microsoft Broadens Zero Trust Training to Address Network and SecOps Domains

Zero Trust architectures are being adopted by enterprises globally to update their security postures in response to the fast changing…

Iranian APT Hackers Targeting Transportation and Manufacturing Sectors in Active Attacks
11
Jul
2025

Iranian APT Hackers Targeting Transportation and Manufacturing Sectors in Active Attacks

Nozomi Networks Labs cybersecurity researchers have reported a startling 133% increase in cyberattacks linked to well-known Iranian advanced persistent threat…

SLOW#TEMPEST Hackers Adopt New Evasion Tactics to Bypass Detection Systems
11
Jul
2025

SLOW#TEMPEST Hackers Adopt New Evasion Tactics to Bypass Detection Systems

Security researchers have uncovered a sophisticated evolution in the SLOW#TEMPEST malware campaign, where threat actors are deploying innovative obfuscation methods…

Qilin Leads in Exploiting Unpatched Fortinet Vulnerabilities
11
Jul
2025

Qilin Leads in Exploiting Unpatched Fortinet Vulnerabilities

The Qilin group has surged to prominence by aggressively exploiting critical vulnerabilities in Fortinet devices, underscoring a broader trend of…

Arkana Ransomware Gang Claims Theft of 2.2 Million Customer Records
11
Jul
2025

Arkana Ransomware Gang Claims Theft of 2.2 Million Customer Records

The Arkana ransomware group burst onto the cybercrime scene with a high-profile attack on WideOpenWest (WOW!), a prominent U.S. internet…

Mis-scoped AWS Organizations Policy Allowed Hackers to Seize Full Control of AWS Environment
11
Jul
2025

Mis-scoped AWS Organizations Policy Allowed Hackers to Seize Full Control of AWS Environment

Security professionals have uncovered serious vulnerabilities in AWS Organizations in a ground-breaking study by Cymulate Research Labs that might allow…

Infostealers Targeting macOS Users in Active Campaigns to Steal Sensitive Data
11
Jul
2025

Infostealers Targeting macOS Users in Active Campaigns to Steal Sensitive Data

MacOS infostealers are becoming a powerful and underappreciated method of data exfiltration in a world where Windows-centric threats predominate. They…