Category: GBHackers

New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers
06
Jun
2025

New Rust-Developed InfoStealer Drains Sensitive Data from Chromium-Based Browsers

A newly identified information-stealing malware, crafted in the Rust programming language, has emerged as a significant threat to users of…

Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts
06
Jun
2025

Hackers Leverage New ClickFix Tactic to Exploit Human Error with Deceptive Prompts

A sophisticated social engineering technique known as ClickFix baiting has gained traction among cybercriminals, ranging from individual hackers to state-sponsored…

ClickFix Attack Uses Fake Cloudflare Verification to Silently Deploy Malware
06
Jun
2025

ClickFix Attack Uses Fake Cloudflare Verification to Silently Deploy Malware

A newly identified social engineering attack dubbed “ClickFix” has emerged as a significant threat, leveraging meticulously crafted fake Cloudflare verification…

DragonForce Ransomware Reportedly Compromised Over 120 Victims in the Past Year
06
Jun
2025

DragonForce Ransomware Reportedly Compromised Over 120 Victims in the Past Year

DragonForce, a ransomware group first identified in fall 2023, has claimed over 120 victims in the past year, marking its…

Scattered Spider Hackers Target Tech Company Help-Desk Administrators
06
Jun
2025

Scattered Spider Hackers Target Tech Company Help-Desk Administrators

A newly identified wave of cyberattacks by the notorious Scattered Spider hacking group has zeroed in on help-desk administrators at…

U.S. Offers $10M Bounty for Information on RedLine Malware Creator
06
Jun
2025

U.S. Offers $10M Bounty for Information on RedLine Malware Creator

The US State Department has announced a reward of up to $10 million for information leading to the identification or…

BADBOX 2.0 Malware Hits Over a Million Android Devices in Global Cyber Threat
06
Jun
2025

BADBOX 2.0 Malware Hits Over a Million Android Devices in Global Cyber Threat

HUMAN’s Satori Threat Intelligence and Research team, in collaboration with Google, Trend Micro, and Shadowserver, has uncovered and partially disrupted…

Critical RCE Vulnerability in AWS Amplify Studio – PoC Now Public
06
Jun
2025

Critical RCE Vulnerability in AWS Amplify Studio – PoC Now Public

In May 2025, AWS disclosed a critical remote code execution (RCE) vulnerability, CVE-2025-4318, in the @aws-amplify/codegen-ui package—a core dependency for…

ANY.RUN Empowers Government Agencies with Real-Time Threat Detection
06
Jun
2025

ANY.RUN Empowers Government Agencies with Real-Time Threat Detection

Government agencies worldwide are facing an unprecedented wave of cyberattacks, with adversaries employing advanced tactics to breach critical infrastructure and…

Critical RCE Flaw Found in HPE Insight Remote Support Tool
06
Jun
2025

Critical RCE Flaw Found in HPE Insight Remote Support Tool

Hewlett-Packard Enterprise (HPE) has released a critical security bulletin addressing multiple high-impact vulnerabilities in its Insight Remote Support (IRS) software,…

Critical FreeRTOS-Plus-TCP Flaw Allows Code Execution or System Crash
06
Jun
2025

Critical FreeRTOS-Plus-TCP Flaw Allows Code Execution or System Crash

A critical memory corruption vulnerability, tracked as CVE-2025-5688, has been disclosed in FreeRTOS-Plus-TCP, Amazon’s open-source TCP/IP stack widely used in…

Chrome Extensions Flaw Exposes Sensitive API Keys, secrets and Tokens
06
Jun
2025

Chrome Extensions Flaw Exposes Sensitive API Keys, secrets and Tokens

A critical security flaw has been uncovered in numerous popular Chrome extensions, affecting millions of users worldwide by exposing sensitive…