Category: GBHackers

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case
16
Jul
2025

Former U.S. Army Member Pleads Guilty in Telecom Hacking Case

A 21-year-old former U.S. Army soldier has pleaded guilty to participating in a sophisticated cybercrime operation that targeted telecommunications companies…

VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution
16
Jul
2025

VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution

Broadcom disclosed four critical vulnerabilities in VMware’s virtualization suite on July 15, 2025, enabling attackers to escape virtual machines and…

Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS
16
Jul
2025

Node.js Vulnerabilities Leave Windows Apps Vulnerable to Path Traversal and HashDoS

The Node.js project has released critical security updates across multiple release lines to address two high-severity vulnerabilities that pose significant…

North Korean Hackers Exploit 67 Malicious npm Packages to Spread XORIndex Malware
15
Jul
2025

North Korean Hackers Exploit 67 Malicious npm Packages to Spread XORIndex Malware

The Socket Threat Research Team has discovered a new software supply chain attack that uses a malware loader called XORIndex…

GLOBAL GROUP RaaS Adds AI-Powered Negotiation Feature for Ransom Demands
15
Jul
2025

GLOBAL GROUP RaaS Adds AI-Powered Negotiation Feature for Ransom Demands

A newly surfaced Ransomware-as-a-Service operation, dubbed GLOBAL GROUP, has begun deploying an AI‐driven negotiation tool that elevates the psychological pressure…

Kafbat UI Vulnerabilities Allow Arbitrary Code Execution via JMX Services
15
Jul
2025

Kafbat UI Vulnerabilities Allow Arbitrary Code Execution via JMX Services

A critical security vulnerability has been discovered in Kafbat UI, a popular web-based interface for managing Apache Kafka clusters, allowing…

Iranian Threat Actors Target U.S. Critical Infrastructure, Including Water Systems
15
Jul
2025

Iranian Threat Actors Target U.S. Critical Infrastructure, Including Water Systems

Iran’s Islamic Revolutionary Guard Corps (IRGC) has increased its asymmetric cyber operations in response to recent U.S. attacks on Iranian…

Ransomware Attack on Albemarle County Exposes Residents’ Personal Information
15
Jul
2025

Ransomware Attack on Albemarle County Exposes Residents’ Personal Information

Albemarle County, Virginia, discovered irregularities in its IT infrastructure under a sophisticated ransomware attack. The breach was quickly recognized by…

Microsoft Explains How Security Copilot in Intune and Entra Supports Security and IT Teams
15
Jul
2025

Microsoft Explains How Security Copilot in Intune and Entra Supports Security and IT Teams

Microsoft has detailed how its Security Copilot, an AI-powered tool, is transforming security and IT operations by embedding generative AI…

Federal IT Contractor to Pay $14.75M for False Cybersecurity Services Claims
15
Jul
2025

Federal IT Contractor to Pay $14.75M for False Cybersecurity Services Claims

Hill ASC Inc., operating as Hill Associates and based in Rockville, Maryland, has agreed to a multimillion-dollar settlement with the…

DShield Honeypot Scanning Hits Record High with Over 1 Million Logs in a Single Day
15
Jul
2025

DShield Honeypot Scanning Hits Record High with Over 1 Million Logs in a Single Day

DShield honeypots have reported previously unheard-of log quantities in a startling increase in cyber reconnaissance activity, with some subnets producing…

Octalyn Stealer Harvests VPN Configs, Passwords, and Cookies in Organized Folder Structure
15
Jul
2025

Octalyn Stealer Harvests VPN Configs, Passwords, and Cookies in Organized Folder Structure

The Octalyn Forensic Toolkit, which is openly accessible on GitHub, has been revealed as a powerful credential stealer that poses…