Category: GBHackers

Gamaredon Unleashes Six New Malware Tools for Stealth, Persistence, and Lateral Movement
02
Jul
2025

Gamaredon Unleashes Six New Malware Tools for Stealth, Persistence, and Lateral Movement

Gamaredon, a Russia-aligned advanced persistent threat (APT) group attributed by Ukraine’s Security Service (SSU) to the FSB’s 18th Center of…

Chinese Student Charged in Mass Smishing Campaign to Steal Victims' Personal Information
02
Jul
2025

Chinese Student Charged in Mass Smishing Campaign to Steal Victims’ Personal Information

Ruichen Xiong, a student from China, has been sentenced to over a year in prison at Inner London Crown Court…

Microsoft Ends Authenticator App’s Password Management Support From 2025
02
Jul
2025

Microsoft Ends Authenticator App’s Password Management Support From 2025

Microsoft has announced it will discontinue password management features in its widely used Authenticator app, marking a significant shift in…

Hackers Target Linux SSH Servers to Deploy TinyProxy and Sing-box Proxy Tools
02
Jul
2025

Hackers Target Linux SSH Servers to Deploy TinyProxy and Sing-box Proxy Tools

Hackers are exploiting poorly managed Linux servers, particularly those with weak SSH credentials, to install proxy tools such as TinyProxy…

IDE Extensions Like VSCode Allow Attackers to Bypass Trust Checks and Deliver Malware to Developer Systems
02
Jul
2025

IDE Extensions Like VSCode Allow Attackers to Bypass Trust Checks and Deliver Malware to Developer Systems

OX Research conducted a ground-breaking study in May and June 2025 that revealed concerning security flaws in the extension verification…

Esse Health Data Breach Exposes Personal and Medical Information of 263,000 Patients
02
Jul
2025

Esse Health Data Breach Exposes Personal and Medical Information of 263,000 Patients

Esse Health, a prominent healthcare provider, disclosed a data breach that has potentially exposed the personal and medical information of…

Cybercriminals Use Malicious PDFs to Impersonate Microsoft, DocuSign, and Dropbox in Targeted Phishing Attacks
02
Jul
2025

Cybercriminals Use Malicious PDFs to Impersonate Microsoft, DocuSign, and Dropbox in Targeted Phishing Attacks

Cisco’s Talos security team has uncovered a surge in sophisticated phishing campaigns leveraging malicious PDF payloads to impersonate trusted brands…

New macOS Malware Uses Process Injection and Remote Access to Steal Keychain Credentials
02
Jul
2025

New macOS Malware Uses Process Injection and Remote Access to Steal Keychain Credentials

A sophisticated campaign by North Korean (DPRK)-aligned threat actors targeting Web3 and cryptocurrency businesses has been uncovered, showcasing an alarming…

YONO SBI Banking App Vulnerability Exposes Users to Man-in-the-Middle Attack
02
Jul
2025

YONO SBI Banking App Vulnerability Exposes Users to Man-in-the-Middle Attack

A critical security flaw has been discovered in the widely used YONO SBI: Banking & Lifestyle app, potentially exposing millions…

Office 365 Introduces New Mail Bombing Detection to Shield Users
02
Jul
2025

Office 365 Introduces New Mail Bombing Detection to Shield Users

Microsoft has announced a significant security upgrade for its Office 365 platform, introducing a new Mail Bombing Detection feature within…

CISA Issues Alert on TeleMessage TM SGNL Flaws Actively Exploited
02
Jul
2025

CISA Issues Alert on TeleMessage TM SGNL Flaws Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert after adding two newly discovered vulnerabilities in…

International Criminal Court Hacked via Sophisticated Cyber Campaign
02
Jul
2025

International Criminal Court Hacked via Sophisticated Cyber Campaign

The International Criminal Court (ICC), the global tribunal responsible for prosecuting serious international crimes, has been targeted by a sophisticated…