Category: GBHackers

Fire Ant Hackers Target VMware ESXi and vCenter Flaws to Infiltrate Organizations
25
Jul
2025

Fire Ant Hackers Target VMware ESXi and vCenter Flaws to Infiltrate Organizations

Cybersecurity firm Sygnia has been tracking and mitigating a sophisticated espionage operation dubbed Fire Ant, which zeroes in on virtualization…

Hackers Exploit Google Forms to Trick Victims into Stealing Cryptocurrency
25
Jul
2025

Hackers Exploit Google Forms to Trick Victims into Stealing Cryptocurrency

Cybercriminals are increasingly using Google Forms to plan cryptocurrency theft in a sophisticated evolution of phishing assaults, taking advantage of…

Phishing Attack Spoofs Facebook Login Page to Capture Credentials
25
Jul
2025

Phishing Attack Spoofs Facebook Login Page to Capture Credentials

Cybercriminals are using a variety of dishonest tactics in a sophisticated phishing effort aimed at Facebook users in order to…

US Announces $15M Reward for North Korean IT Scheme Leaders
25
Jul
2025

US Announces $15M Reward for North Korean IT Scheme Leaders

The United States government announced coordinated actions across multiple departments today, offering rewards totaling up to $15 million for information…

Critical VGAuth Flaw in VMware Tools Grants Full System Access
25
Jul
2025

Critical VGAuth Flaw in VMware Tools Grants Full System Access

Security researchers have uncovered critical vulnerabilities in VMware Tools’ Guest Authentication Service (VGAuth) that allow attackers to escalate privileges from…

Tridium Niagara Framework Flaws Expose Sensitive Network Data
25
Jul
2025

Tridium Niagara Framework Flaws Expose Sensitive Network Data

Cybersecurity researchers at Nozomi Networks Labs have discovered 13 critical vulnerabilities in Tridium’s widely-used Niagara Framework, potentially exposing sensitive network…

Malware Campaign Uses YouTube and Discord to Harvest Credentials from Computers
25
Jul
2025

Malware Campaign Uses YouTube and Discord to Harvest Credentials from Computers

The Acronis Threat Research Unit (TRU) has uncovered a sophisticated malware campaign deploying infostealers like Leet Stealer, its modified variant…

New CastleLoader Attack Uses Cloudflare-themed Clickfix Method to Compromise Windows Systems
25
Jul
2025

New CastleLoader Attack Uses Cloudflare-themed Clickfix Method to Compromise Windows Systems

A newly identified loader malware dubbed CastleLoader has emerged as a significant threat since early 2025, rapidly evolving into a…

xonPlus Launches Real-Time Breach Alerting Platform For Enterprise Credential Exposure
25
Jul
2025

xonPlus Launches Real-Time Breach Alerting Platform For Enterprise Credential Exposure

Chennai, India, July 25th, 2025, CyberNewsWire xonPlus, a real-time digital risk alerting system, officially launches today to help security teams…

BlackSuit Ransomware Infrastructure Seized by Authorities
25
Jul
2025

BlackSuit Ransomware Infrastructure Seized by Authorities

International law enforcement agencies delivered a significant blow to cybercriminals this week with the successful takedown of critical infrastructure belonging…

Hackers Inject Destructive Commands into Amazon’s AI Coding Agent
25
Jul
2025

Hackers Inject Destructive Commands into Amazon’s AI Coding Agent

A significant security breach has exposed critical vulnerabilities in Amazon’s artificial intelligence infrastructure, with hackers successfully injecting malicious computer-wiping commands…

Bulletproof Host Aeza Group Moves Infrastructure to New Autonomous System
25
Jul
2025

Bulletproof Host Aeza Group Moves Infrastructure to New Autonomous System

Threat analysts at Silent Push announced the discovery of a major infrastructure shift by the bulletproof hosting provider Aeza Group,…