Category: GBHackers

Hackers Launch Active Attacks on Telecom and Media Industries
26
Nov
2025

Hackers Launch Active Attacks on Telecom and Media Industries

The telecommunications & media sector stands at the epicenter of a relentless cyber onslaught, as evidenced by CYFIRMA’s latest quarterly…

Chrome Extension Malware Secretly Adds Hidden SOL Fees to Solana Swap Transactions
26
Nov
2025

Chrome Extension Malware Secretly Adds Hidden SOL Fees to Solana Swap Transactions

Security researchers at Socket have uncovered a deceptive Chrome extension called Crypto Copilot that masquerades as a legitimate Solana trading…

Threat Actors Use Fake Update Lures to Deploy SocGholish Malware
26
Nov
2025

Threat Actors Use Fake Update Lures to Deploy SocGholish Malware

In a significant escalation of cyber threats, Arctic Wolf Labs has identified a coordinated campaign in which the Russian-aligned RomCom…

ByteToBreach Offers Stolen Global Airline, Banking, and Government Records
26
Nov
2025

ByteToBreach Offers Stolen Global Airline, Banking, and Government Records

A cybercriminal operating under the alias ByteToBreach has emerged as a prominent figure in the underground data trade, orchestrating a…

Hackers Trick macOS Users into Running Terminal Commands to Install FlexibleFerret Malware
26
Nov
2025

Hackers Trick macOS Users into Running Terminal Commands to Install FlexibleFerret Malware

North Korean-aligned threat actors are leveraging convincing fake job recruitment websites to deceive macOS users into executing malicious Terminal commands…

Hackers Use Fake “Battlefield 6” Hype to Spread Stealers and C2 Malware
26
Nov
2025

Hackers Use Fake “Battlefield 6” Hype to Spread Stealers and C2 Malware

The global gaming community is reeling after Bitdefender Labs revealed widespread malware operations exploiting the blockbuster launch of Electronic Arts’…

A Novel Exploit Leveraging URL Fragments To Deceive AI Browsers
26
Nov
2025

A Novel Exploit Leveraging URL Fragments To Deceive AI Browsers

Security researchers at Cato CTRL have uncovered HashJack. This innovative indirect prompt-injection attack hides harmful commands in the fragment portion…

Gamayun APT Exploits New MSC EvilTwin Vulnerability to Deliver Malicious Payloads
26
Nov
2025

Gamayun APT Exploits New MSC EvilTwin Vulnerability to Deliver Malicious Payloads

Water Gamayun, a Russia‑aligned advanced persistent threat (APT) group, has launched a new multi‑stage intrusion campaign that weaponizes the recently…

VSCode Marketplace Hit by Rogue Prettier Extension Delivering Anivia Stealer
25
Nov
2025

VSCode Marketplace Hit by Rogue Prettier Extension Delivering Anivia Stealer

A recently discovered malicious Visual Studio Code (VSCode) extension masquerading as the well-known “Prettier” formatter briefly infiltrated the official VSCode…

Cobalt Strike 4.12 Adds New Injection, UAC Bypasses & C2 Features
25
Nov
2025

Cobalt Strike 4.12 Adds New Injection, UAC Bypasses & C2 Features

Fortra has officially released Cobalt Strike 4.12, introducing a comprehensive suite of new features designed to enhance red team operations and…

Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams
25
Nov
2025

Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams

Horsham, United Kingdom, November 25th, 2025, CyberNewsWire Detego Global, the company behind the award-winning Unified Digital Forensics Platform, is proud…

Sha1-Hulud Attack Hits 800+ npm Packages and Thousands of GitHub Repos
25
Nov
2025

Sha1-Hulud Attack Hits 800+ npm Packages and Thousands of GitHub Repos

Shai-Huluda, a self-replicating npm worm named after the sandworms in Dune, had struck again. This time, the attack was devastating…