Category: GBHackers

Wing FTP Server Vulnerability Allows Full Server Takeover by Attackers
03
Jul
2025

Wing FTP Server Vulnerability Allows Full Server Takeover by Attackers

A newly disclosed critical vulnerability in Wing FTP Server threatens thousands of organizations worldwide, enabling attackers to achieve full server takeover through unauthenticated remote…

Ransomware Attacks on Organizations Surge 213% in Q1 of 2025
03
Jul
2025

Ransomware Attacks on Organizations Surge 213% in Q1 of 2025

Ransomware assaults on businesses around the world have increased by 213% in the first quarter of 2025, with 2,314 victims…

Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
03
Jul
2025

Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks

A shadowy group known as Keymous+ has emerged as a formidable force in the cyber landscape, claiming responsibility for over…

Apache Seata Flaw Enables Deserialization of Untrusted Data
03
Jul
2025

Apache Seata Flaw Enables Deserialization of Untrusted Data

A newly disclosed vulnerability in Apache Seata, a popular open-source distributed transaction solution, has raised security concerns for organizations relying…

Surge in LNK File Weaponization by 50%, Fueling Four Major Malware Types
03
Jul
2025

Surge in LNK File Weaponization by 50%, Fueling Four Major Malware Types

The weaponization of Windows shortcut (LNK) files for malware distribution has increased by an astounding 50%, according to telemetry data,…

ModSecurity WAF Vulnerability Enables DoS Using Empty XML Elements
03
Jul
2025

ModSecurity WAF Vulnerability Enables DoS Using Empty XML Elements

A newly disclosed vulnerability in ModSecurity, a widely used open-source web application firewall (WAF), exposes servers to denial-of-service (DoS) attacks…

Cl0p Ransomware’s Exfiltration Process Exposes RCE Vulnerability
03
Jul
2025

Cl0p Ransomware’s Exfiltration Process Exposes RCE Vulnerability

A newly disclosed vulnerability in the Python-based data-exfiltration utility used by the notorious Cl0p ransomware group has exposed the cybercrime…

Gamaredon Unleashes Six New Malware Tools for Stealth, Persistence, and Lateral Movement
02
Jul
2025

Gamaredon Unleashes Six New Malware Tools for Stealth, Persistence, and Lateral Movement

Gamaredon, a Russia-aligned advanced persistent threat (APT) group attributed by Ukraine’s Security Service (SSU) to the FSB’s 18th Center of…

Chinese Student Charged in Mass Smishing Campaign to Steal Victims' Personal Information
02
Jul
2025

Chinese Student Charged in Mass Smishing Campaign to Steal Victims’ Personal Information

Ruichen Xiong, a student from China, has been sentenced to over a year in prison at Inner London Crown Court…

Microsoft Ends Authenticator App’s Password Management Support From 2025
02
Jul
2025

Microsoft Ends Authenticator App’s Password Management Support From 2025

Microsoft has announced it will discontinue password management features in its widely used Authenticator app, marking a significant shift in…

Hackers Target Linux SSH Servers to Deploy TinyProxy and Sing-box Proxy Tools
02
Jul
2025

Hackers Target Linux SSH Servers to Deploy TinyProxy and Sing-box Proxy Tools

Hackers are exploiting poorly managed Linux servers, particularly those with weak SSH credentials, to install proxy tools such as TinyProxy…

IDE Extensions Like VSCode Allow Attackers to Bypass Trust Checks and Deliver Malware to Developer Systems
02
Jul
2025

IDE Extensions Like VSCode Allow Attackers to Bypass Trust Checks and Deliver Malware to Developer Systems

OX Research conducted a ground-breaking study in May and June 2025 that revealed concerning security flaws in the extension verification…