Category: GBHackers

Threat Actors Poison Bing Search Results to Distribute Bumblebee Malware via 'ManageEngine OpManager' Queries
06
Aug
2025

Threat Actors Poison Bing Search Results to Distribute Bumblebee Malware via ‘ManageEngine OpManager’ Queries

Threat actors leveraged SEO poisoning techniques to manipulate Bing search results, directing users querying for “ManageEngine OpManager” to a malicious…

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders
06
Aug
2025

Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders

Unit 42 researchers have identified significant overlaps between Microsoft’s reported ToolShell exploit chain targeting SharePoint vulnerabilities and a tracked activity…

Chinese Hackers Breach Exposes 115 Million U.S. Payment Cards
06
Aug
2025

Chinese Hackers Breach Exposes 115 Million U.S. Payment Cards

Security researchers have uncovered a highly advanced network of Chinese-speaking cybercriminal syndicates orchestrating smishing attacks that exploit digital wallet tokenization,…

Trend Micro Apex One Hit by Actively Exploited RCE Vulnerability
06
Aug
2025

Trend Micro Apex One Hit by Actively Exploited RCE Vulnerability

Trend Micro has issued an urgent security bulletin warning customers of critical remote code execution vulnerabilities in its Apex One…

CISA Alerts on Ongoing Exploits Targeting D-Link Device Vulnerabilities
06
Aug
2025

CISA Alerts on Ongoing Exploits Targeting D-Link Device Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has escalated its campaign to protect U.S. networks by adding three newly exploited…

Threat Actors Weaponizing RMM Tools to Gain System Control and Exfiltrate Data
06
Aug
2025

Threat Actors Weaponizing RMM Tools to Gain System Control and Exfiltrate Data

Adversaries are using Remote Monitoring and Management (RMM) tools more frequently as dual-purpose weapons for initial access and persistence in…

Millions of Dell PCs at Risk from Broadcom Vulnerability Enabling Remote Hijack
06
Aug
2025

Millions of Dell PCs at Risk from Broadcom Vulnerability Enabling Remote Hijack

Cybersecurity researchers at Cisco Talos have discovered five critical vulnerabilities in Dell’s ControlVault3 security hardware that could affect millions of…

MCPoison Attack Abuses Cursor IDE to Run Arbitrary System Commands
06
Aug
2025

MCPoison Attack Abuses Cursor IDE to Run Arbitrary System Commands

Cybersecurity researchers have uncovered a critical vulnerability in Cursor IDE that allows attackers to execute arbitrary system commands through a…

Security Risk Advisors Launches SCALR AI for Fast-Track Agentive AI Enablement
05
Aug
2025

Security Risk Advisors Launches SCALR AI for Fast-Track Agentive AI Enablement

Security Risk Advisors (SRA), a leading cybersecurity consulting firm, today announced the launch of SCALR AI, a customizable platform designed…

Comp AI Raises $2.6M to Streamline and Disrupt the SOC 2 Market
05
Aug
2025

Comp AI Raises $2.6M to Streamline and Disrupt the SOC 2 Market

San Francisco, California, August 1st, 2025, CyberNewsWire Comp AI Raises $2.6M in Pre-Seed Funding to Revolutionize Enterprise Compliance with AI-Powered…

SonicWall Alerts on Surge of Attacks Against Gen 7 Firewalls Over Past 72 Hours
05
Aug
2025

SonicWall Alerts on Surge of Attacks Against Gen 7 Firewalls Over Past 72 Hours

SonicWall has issued an urgent security advisory following a significant escalation in cyberattacks targeting Generation 7 firewalls with enabled SSLVPN…

U.S. Treasury Warns Crypto ATMs Are Aiding Criminal Activity
05
Aug
2025

U.S. Treasury Warns Crypto ATMs Are Aiding Criminal Activity

The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) has issued Notice FIN-2025-NTC1, dated August 4, 2025, warning…