Category: GBHackers

New Scan Uncovers 150K Industrial Systems Worldwide Vulnerable to Cyberattacks
21
May
2025

New Scan Uncovers 150K Industrial Systems Worldwide Vulnerable to Cyberattacks

A groundbreaking study leveraging advanced application-layer scanning has exposed approximately 150,000 industrial control systems (ICS) worldwide that are directly accessible…

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees
21
May
2025

Hackers Masquerade as Organizations to Steal Payroll Logins and Redirect Payments from Employees

ReliaQuest, hackers have deployed a cunning search engine optimization (SEO) poisoning scheme to orchestrate payroll fraud against a manufacturing sector…

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication
21
May
2025

Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs to spread malicious containers and mine…

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security
21
May
2025

Hackers Target Mobile Users Using PWA JavaScript to Bypass Browser Security

A sophisticated new injection campaign has been uncovered, targeting mobile users through malicious third-party JavaScript to deliver a Chinese adult-content…

PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram
21
May
2025

PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram

A newly identified .NET-based information-stealing malware, dubbed PupkinStealer (also known as PumpkinStealer in some reports), has surfaced as a significant…

71 Fake Websites Impersonating German Retailer to Steal Payment Information
21
May
2025

71 Fake Websites Impersonating German Retailer to Steal Payment Information

Recorded Future Payment Fraud Intelligence has uncovered a sprawling network of 71 fraudulent e-commerce domains designed to impersonate a prominent…

Over 100 Malicious Chrome Extensions Exploiting Users to Steal Login Credentials and Execute Remote Code
21
May
2025

Over 100 Malicious Chrome Extensions Exploiting Users to Steal Login Credentials and Execute Remote Code

Cybersecurity researchers have uncovered a sprawling network of over 100 malicious Chrome extensions actively exploiting unsuspecting users. These extensions, masquerading…

19-Year-Old Hacker Admits Guilt in Major Cyberattack on PowerSchool
21
May
2025

19-Year-Old Hacker Admits Guilt in Major Cyberattack on PowerSchool

Massachusetts college student stands accused of orchestrating a sweeping cyberattack on PowerSchool, a widely used educational software provider, resulting in…

One-Third of Cyber Attacks Use Advanced Tactics to Steal Login Credentials
21
May
2025

One-Third of Cyber Attacks Use Advanced Tactics to Steal Login Credentials

IBM X-Force’s 2024 cybersecurity report, nearly one-third of cyber intrusions now rely on identity-based attacks, exploiting valid login credentials to…

VanHelsing Ransomware Builder Exposed on Hacker Forums
21
May
2025

VanHelsing Ransomware Builder Exposed on Hacker Forums

The cybersecurity landscape reveal that the VanHelsing ransomware operation has experienced a significant security breach with its source code being…

PowerDNS Vulnerability Let Attacker Trigger DoS Attack Via Malicious TCP connection
21
May
2025

PowerDNS Vulnerability Let Attacker Trigger DoS Attack Via Malicious TCP connection

PowerDNS has released a critical security update to address a vulnerability in its DNSdist load balancer that could allow remote…

SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected
21
May
2025

SideWinder APT Hackers Exploits Legacy Office Vulnerabilities to Deploy Malware Undetected

The Acronis Threat Research Unit (TRU) has revealed an advanced campaign believed to be orchestrated by the SideWinder advanced persistent…