Category: GBHackers

Weaponized PuTTY Delivered via Malicious Bing Ads Targets Kerberos and Active Directory services
26
Aug
2025

Weaponized PuTTY Delivered via Malicious Bing Ads Targets Kerberos and Active Directory services

Cybersecurity incidents increasingly exploit human vulnerabilities, including those of privileged users, as demonstrated in recent compromises involving trojanized versions of…

Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V
26
Aug
2025

Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V

Microsoft today announced the public preview of a new VM Conversion extension for Windows Admin Center, enabling IT administrators to migrate virtual…

Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware
26
Aug
2025

Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware

Threat actors are increasingly refining Android droppers to circumvent enhanced security measures, extending their utility beyond sophisticated banking trojans to…

Beware! Fake Google Play Store Sites Used to Spread Android Malware
26
Aug
2025

Beware! Fake Google Play Store Sites Used to Spread Android Malware

Cybersecurity researchers have identified a resurgence of SpyNote malware campaigns targeting Android users through sophisticated fake Google Play Store websites….

Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python
26
Aug
2025

Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python

A critical security risk has emerged for Windows users of WhatsApp Desktop who also have Python installed. Attackers can exploit…

Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection
26
Aug
2025

Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection

Google Threat Intelligence Group (GTIG) has uncovered a multifaceted cyber espionage operation attributed to the PRC-nexus threat actor UNC6384, believed…

Maryland Transportation Systems Disrupted Following Cyberattack
26
Aug
2025

Maryland Transportation Systems Disrupted Following Cyberattack

Maryland’s transit network experienced widespread disruption this week after a sophisticated cyberattack targeted critical information systems, forcing the Maryland Transit…

X/Twitter Found to Be Most Aggressive Social Media App in Tracking User Location Data
26
Aug
2025

X/Twitter Found to Be Most Aggressive Social Media App in Tracking User Location Data

A comprehensive study examining the location data practices of the top 10 social media platforms has uncovered concerning patterns of…

French Retailer Auchan Hit by Cyberattack, Customer Data Compromised
26
Aug
2025

French Retailer Auchan Hit by Cyberattack, Customer Data Compromised

French retail giant Auchan announced on August 21 that it fell victim to a cyberattack that resulted in the theft of loyalty…

CISA Issues Alert on Citrix Flaws Actively Exploited by Hackers
26
Aug
2025

CISA Issues Alert on Citrix Flaws Actively Exploited by Hackers

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent security alert after adding three critical vulnerabilities to its…

Hackers Scan IPs to Target Microsoft Remote Desktop Web Access
26
Aug
2025

Hackers Scan IPs to Target Microsoft Remote Desktop Web Access

A sophisticated scanning campaign has escalated dramatically, with threat intelligence firm GreyNoise detecting over 30,000 unique IP addresses simultaneously probing Microsoft Remote…

Beware! Google Ads Promote Fake Tesla Websites Soliciting Fraudulent Deposits
25
Aug
2025

Beware! Google Ads Promote Fake Tesla Websites Soliciting Fraudulent Deposits

Scammers are using Google Ads to pose as Tesla in an elaborate cybercrime campaign that aims to obtain illicit preorders…