Category: GBHackers

Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents
01
Nov
2025

Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents

In October 2025, cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated malware campaign distributing weaponized ZIP…

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks
01
Nov
2025

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks

The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities catalog,…

Cisco IOS XE Vulnerability Being Abused in the Wild to Plant BADCANDY
01
Nov
2025

Cisco IOS XE Vulnerability Being Abused in the Wild to Plant BADCANDY

Cybersecurity authorities are raising urgent alarms as threat actors continue to exploit a critical vulnerability in Cisco IOS XE devices,…

CISA Issues Advisory on XWiki Flaw Allowing Remote Code Execution
31
Oct
2025

CISA Issues Advisory on XWiki Flaw Allowing Remote Code Execution

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting XWiki Platform to its Known Exploited Vulnerabilities…

Google Launches New AI Security Features on Android to Block Mobile Scams
31
Oct
2025

Google Launches New AI Security Features on Android to Block Mobile Scams

Google has announced enhanced artificial intelligence protections designed to combat the rising tide of mobile scams affecting billions of users…

Attackers Exploit Windows Server Update Services Flaw to Steal Sensitive Organizational Data
31
Oct
2025

Attackers Exploit Windows Server Update Services Flaw to Steal Sensitive Organizational Data

Sophos researchers have identified real-world exploitation of a newly disclosed vulnerability in Windows Server Update Services (WSUS), where threat actors…

Stolen Credentials Drive the Rise of Financially Motivated Cyberattacks
31
Oct
2025

Stolen Credentials Drive the Rise of Financially Motivated Cyberattacks

Throughout the first half of 2025, the FortiGuard Incident Response team investigated dozens of security breaches across multiple industries driven…

Beware of Fake ChatGPT Apps That Spy on Users and Steal Sensitive Data
31
Oct
2025

Beware of Fake ChatGPT Apps That Spy on Users and Steal Sensitive Data

The proliferation of artificial intelligence applications has created unprecedented opportunities for cybercriminals to exploit user trust through deceptive mobile apps….

Researchers Develop Linux Rootkit That Evades Elastic EDR Protections
31
Oct
2025

Researchers Develop Linux Rootkit That Evades Elastic EDR Protections

Security researchers have unveiled a sophisticated Linux rootkit capable of bypassing Elastic Security’s advanced detection mechanisms, demonstrating critical vulnerabilities in…

Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data
31
Oct
2025

Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data

In mid-2025, Secureworks Counter Threat Unit (CTU) researchers uncovered a sophisticated cyber campaign where Chinese state-sponsored threat actors from the…

WhatsApp Implements Passkey System to Boost Backup Privacy
31
Oct
2025

WhatsApp Implements Passkey System to Boost Backup Privacy

WhatsApp has announced a significant security upgrade that makes protecting your chat backups simpler and more secure than ever before….

Threat Actors Exploiting Open-Source C2 Frameworks to Deploy Malicious Payloads
31
Oct
2025

Threat Actors Exploiting Open-Source C2 Frameworks to Deploy Malicious Payloads

Threat intelligence researchers have uncovered a growing campaign where cybercriminals are weaponizing AdaptixC2, a legitimate open-source Command and Control framework…