Category: GBHackers

Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
06
Aug
2025

Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks

Security researchers have identified a sophisticated new tactic employed by Akira ransomware operators, who are exploiting legitimate Windows drivers to…

Fake Antivirus App Delivers LunaSpy Malware to Android Devices
06
Aug
2025

Fake Antivirus App Delivers LunaSpy Malware to Android Devices

A sophisticated cybercrime campaign has been discovered targeting Android users through fake antivirus applications that actually deliver LunaSpy spyware to…

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware
06
Aug
2025

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware

UAC-0099 is a threat actor organization that has been targeting state officials, defense forces, and defense-industrial firms in a series…

Threat Actors Use GenAI to Launch Phishing Attacks Mimicking Government Websites
06
Aug
2025

Threat Actors Use GenAI to Launch Phishing Attacks Mimicking Government Websites

Threat actors are increasingly leveraging generative AI (GenAI) tools to craft highly convincing phishing websites that impersonate legitimate government portals….

Sophisticated DevilsTongue Spyware Tracks Windows Users Worldwide
06
Aug
2025

Sophisticated DevilsTongue Spyware Tracks Windows Users Worldwide

Insikt Group has uncovered new infrastructure tied to the Israeli spyware vendor Candiru, now operating under Saito Tech Ltd., highlighting…

Fake CAPTCHA Used in New ClickFix Attack to Deploy Malware Payload
06
Aug
2025

Fake CAPTCHA Used in New ClickFix Attack to Deploy Malware Payload

ClickFix, which began as a red-team simulation tool in September 2024, has quickly developed into a widespread malware delivery system…

WhatsApp Adds Security Feature to Help Users Spot and Avoid Malicious Messages
06
Aug
2025

WhatsApp Adds Security Feature to Help Users Spot and Avoid Malicious Messages

WhatsApp is rolling out enhanced security measures to combat the surge in scam messages targeting users worldwide, as criminal organizations…

Pandora Jewellery Hit by Cyberattack, Customer Data Compromised
06
Aug
2025

Pandora Jewellery Hit by Cyberattack, Customer Data Compromised

Pandora, the world-renowned Danish jewelry retailer, recently suffered a major cybersecurity incident involving unauthorized access to customer information through a…

Rockwell Arena Simulation Flaws Allow Remote Execution of Malicious Code
06
Aug
2025

Rockwell Arena Simulation Flaws Allow Remote Execution of Malicious Code

Rockwell Automation has disclosed three critical memory corruption vulnerabilities in its Arena Simulation software that could allow attackers to execute…

Adobe AEM Forms 0-Day Vulnerability Allows Attackers to Run Arbitrary Code
06
Aug
2025

Adobe AEM Forms 0-Day Vulnerability Allows Attackers to Run Arbitrary Code

Adobe has released critical security updates for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition following the discovery of…

Threat Actors Poison Bing Search Results to Distribute Bumblebee Malware via 'ManageEngine OpManager' Queries
06
Aug
2025

Threat Actors Poison Bing Search Results to Distribute Bumblebee Malware via ‘ManageEngine OpManager’ Queries

Threat actors leveraged SEO poisoning techniques to manipulate Bing search results, directing users querying for “ManageEngine OpManager” to a malicious…

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders
06
Aug
2025

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders

Unit 42 researchers have identified significant overlaps between Microsoft’s reported ToolShell exploit chain targeting SharePoint vulnerabilities and a tracked activity…