Category: GBHackers

Cobalt Strike 4.11.1 Released With SSL Checkbox Fix
13
May
2025

Cobalt Strike 4.11.1 Released With SSL Checkbox Fix

Cobalt Strike has announced the release of version 4.11.1, an out-of-band update addressing several critical issues discovered in the previous…

Attackers Leverage Unpatched Output Messenger 0‑Day to Deliver Malicious Payloads
13
May
2025

Attackers Leverage Unpatched Output Messenger 0‑Day to Deliver Malicious Payloads

A Türkiye-affiliated espionage threat actor, tracked by Microsoft Threat Intelligence as Marbled Dust (also known as Sea Turtle and UNC1326),…

Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals
13
May
2025

Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals

The United States indicted fourteen North Korean nationals for orchestrating a sophisticated scheme to secure remote IT jobs at American…

Apple Releases Security Patches to Fix Critical Data Exposure Flaws
13
May
2025

Apple Releases Security Patches to Fix Critical Data Exposure Flaws

Apple released critical security updates for macOS Sequoia 15.5 on May 12, 2025, addressing over 40 vulnerabilities across system components…

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations
13
May
2025

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear phishing campaign targeting activists focused on…

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns
12
May
2025

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black Banshee,” has been active since at…

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques
12
May
2025

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware has evolved with sophisticated PowerShell tools…

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms
12
May
2025

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as a lure. Dubbed Noodlophile Stealer, this…

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection
12
May
2025

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs (Uniform Resource Identifiers) to deliver credential…

“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram
12
May
2025

“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram

A new information-stealing malware dubbed “PupkinStealer” has emerged as a significant threat to individuals and enterprises. Developed in C# using…

20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week
12
May
2025

20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week

A 20-year-old criminal proxy network has been disrupted through a joint operation involving Lumen’s Black Lotus Labs, the U.S. Department…

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft
12
May
2025

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft

Distributed Denial of Service (DDoS) attacks, once seen as crude tools for disruption wielded by script kiddies and hacktivists, have…