Category: GBHackers

Zoom for Windows Flaw Allows Attackers to Trigger DoS Attacks
09
Jul
2025

Zoom for Windows Flaw Allows Attackers to Trigger DoS Attacks

Security researchers have uncovered two significant vulnerabilities in Zoom Clients for Windows, exposing users to potential Denial of Service (DoS)…

NetSupport RAT Spreads Through Compromised WordPress Sites Using ClickFix Technique
09
Jul
2025

NetSupport RAT Spreads Through Compromised WordPress Sites Using ClickFix Technique

The Cybereason Global Security Operations Center (GSOC) has uncovered a sophisticated campaign by threat actors who are exploiting compromised WordPress…

Hackers Manipulate Search Results to Target IT Pros with Trojanized PuTTY and WinSCP
09
Jul
2025

Hackers Manipulate Search Results to Target IT Pros with Trojanized PuTTY and WinSCP

Arctic Wolf has uncovered a cunning cybersecurity threat that exploits search engine optimization (SEO) poisoning and malvertising tactics to distribute…

China-Linked VELETRIX Loader Used in Attacks on Telecommunications Infrastructure
09
Jul
2025

China-Linked VELETRIX Loader Used in Attacks on Telecommunications Infrastructure

A China-Nexus Threat Actor has launched a highly advanced assault against China Mobile Tietong Co., Ltd., a division of China…

11 Google-Verified Chrome Extensions Infected Over 1.7 Million Users
09
Jul
2025

11 Google-Verified Chrome Extensions Infected Over 1.7 Million Users

A chilling discovery by Koi Security has exposed a sophisticated browser hijacking campaign dubbed “RedDirection,” compromising over 1.7 million users…

New Report Finds Billions of Leaked Credentials and ULP Files on Dark Web Are Outdated
09
Jul
2025

New Report Finds Billions of Leaked Credentials and ULP Files on Dark Web Are Outdated

A recent in-depth analysis by threat intelligence experts sheds critical light on the pervasive issue of outdated and unreliable data…

XMRig Malware Disables Windows Updates and Scheduled Tasks to Maintain Persistence
08
Jul
2025

XMRig Malware Disables Windows Updates and Scheduled Tasks to Maintain Persistence

Monero (XMR), a cryptocurrency, saw a spectacular surge in early 2025, rising 45% from $196 to $285 by May, with…

BERT Ransomware Can Force Shutdown of ESXi Virtual Machines to Hinder Recovery
08
Jul
2025

BERT Ransomware Can Force Shutdown of ESXi Virtual Machines to Hinder Recovery

A newly identified ransomware group, BERT, tracked by Trend Micro as Water Pombero, has emerged as a significant threat to…

Researchers Reveal Scatter Spider’s Tools, Tactics, and Key Indicators
08
Jul
2025

Researchers Reveal Scatter Spider’s Tools, Tactics, and Key Indicators

Check Point Research has revealed important details about the phishing domain patterns and advanced attack techniques of the infamous Scattered…

New LogoKit Phishing Campaign Exploits Cloudflare Turnstile and Amazon S3 for Higher Success Rates
08
Jul
2025

New LogoKit Phishing Campaign Exploits Cloudflare Turnstile and Amazon S3 for Higher Success Rates

Cyble Research and Intelligence Labs (CRIL) recently discovered a very advanced phishing campaign that used the LogoKit phishing kit, which…

Ivanti Products Connect Secure and Policy Secure Hit by Denial-of-Service Vulnerabilities
08
Jul
2025

Ivanti Products Connect Secure and Policy Secure Hit by Denial-of-Service Vulnerabilities

Ivanti has released critical security updates for its Connect Secure and Policy Secure products, addressing six medium-severity vulnerabilities that could…

FortiOS Buffer Overflow vulnerability Enables Remote Code Execution by Attackers
08
Jul
2025

FortiOS Buffer Overflow vulnerability Enables Remote Code Execution by Attackers

Fortinet has disclosed a critical security vulnerability in FortiOS that could allow authenticated attackers to execute arbitrary code through a…