Category: GBHackers

MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100 Unique IPs
26
Jun
2025

MOVEit Transfer Systems Hit by Wave of Attacks Using Over 100 Unique IPs

A dramatic surge in scanning and exploitation activity targeting Progress Software’s MOVEit Transfer file-sharing platform has alarmed cybersecurity researchers and…

Authorities Arrest Five Operators Behind Infamous BreachForums Cybercrime Hub
26
Jun
2025

Authorities Arrest Five Operators Behind Infamous BreachForums Cybercrime Hub

In a sweeping crackdown that has sent shockwaves through the global cybercrime community, French authorities have arrested five key operators…

North Korean Hackers Pose as Recruiters, Target Developers with 35 New Malicious npm Packages
26
Jun
2025

North Korean Hackers Pose as Recruiters, Target Developers with 35 New Malicious npm Packages

A new cyber campaign orchestrated by North Korean threat actors has been exposed by the Socket Threat Research Team, revealing…

Multiple Brother Device Vulnerabilities Allow Attackers to Execute Arbitrary HTTP Requests
26
Jun
2025

Multiple Brother Device Vulnerabilities Allow Attackers to Execute Arbitrary HTTP Requests

A zero-day research project has uncovered eight new vulnerabilities in multifunction printers (MFPs) and related devices from Brother Industries, Ltd.,…

New Malware Discovered Using Prompt Injection to Manipulate AI Models in the Wild
25
Jun
2025

New Malware Discovered Using Prompt Injection to Manipulate AI Models in the Wild

Researchers have uncovered a new malware sample in the wild that employs a unique and unconventional evasion tactic: prompt injection…

Beware of Weaponized Wedding Invite Scams Delivering SpyMax RAT to Android Devices
25
Jun
2025

Beware of Weaponized Wedding Invite Scams Delivering SpyMax RAT to Android Devices

A sophisticated Android phishing campaign, aptly named “Wedding Invitation,” has emerged as a significant threat targeting mobile users across India….

INTERPOL Cautions of Significant Increase in Cyber Attacks on Western and Eastern Africa
25
Jun
2025

INTERPOL Cautions of Significant Increase in Cyber Attacks on Western and Eastern Africa

The INTERPOL 2025 Africa Cyberthreat Assessment Report has raised alarms over a dramatic surge in cybercrime across Africa, with Western…

Kubernetes NodeRestriction Flaw Lets Nodes Bypass Resource Authorization
25
Jun
2025

Kubernetes NodeRestriction Flaw Lets Nodes Bypass Resource Authorization

A critical security vulnerability (CVE-2025-4563) in Kubernetes allows nodes to bypass authorization checks for dynamic resource allocation, potentially enabling privilege…

CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development
25
Jun
2025

CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development

The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA), has released a comprehensive guide…

Threat Actors Distribute Compromised SonicWall SSL VPN NetExtender to Steal Sensitive Data
25
Jun
2025

Threat Actors Distribute Compromised SonicWall SSL VPN NetExtender to Steal Sensitive Data

Threat actors were discovered disseminating a malicious, altered version of SonicWall’s SSL VPN NetExtender application in a complex cyberattack that…

Windows 11 Configuration Bug Freezes Update Scanning Process
25
Jun
2025

Windows 11 Configuration Bug Freezes Update Scanning Process

A recently discovered bug in Windows 11 has caused significant frustration among users, as the operating system’s update scanning process…

Hacktivist Groups Target U.S. Companies and Military Domains in Retaliation for Iran Attacks
25
Jun
2025

Hacktivist Groups Target U.S. Companies and Military Domains in Retaliation for Iran Attacks

The United States has become a popular target for hacktivist groups in the escalating Israel-Iran conflict, following U.S. attacks on…