Category: GBHackers

KongTuke Campaign Deploys Modified Interlock RAT Using FileFix Method Against Windows Environments
14
Jul
2025

KongTuke Campaign Deploys Modified Interlock RAT Using FileFix Method Against Windows Environments

Researchers from The DFIR Report, collaborating with Proofpoint, have uncovered a resilient PHP-based variant of the Interlock ransomware group’s remote…

Louis Vuitton Suffers Data Breach—Customer Information Stolen
14
Jul
2025

Louis Vuitton Suffers Data Breach—Customer Information Stolen

Luxury fashion house Louis Vuitton has confirmed that customer data from its UK operations was compromised in a cyber-attack, marking…

Microsoft Explains How to Find and Stop Processes Blocking Files in Windows
14
Jul
2025

Microsoft Explains How to Find and Stop Processes Blocking Files in Windows

Microsoft has provided comprehensive guidance on resolving one of Windows users’ most frustrating issues: the dreaded “The process cannot access…

Gigabyte UEFI Firmware Vulnerability Allows Code Execution in SMM Privileged Mode
14
Jul
2025

Gigabyte UEFI Firmware Vulnerability Allows Code Execution in SMM Privileged Mode

Critical security vulnerabilities in Gigabyte motherboard firmware have been disclosed that allow attackers to execute arbitrary code in System Management…

14
Jul
2025

Microsoft Explains How to Find and Stop Processes Blocking Files in Windows

Microsoft has provided comprehensive guidance on resolving one of Windows users’ most frustrating issues: the dreaded “The process cannot access…

Threat Actors Target Gen Z Gamers Through Popular Titles
14
Jul
2025

Threat Actors Target Gen Z Gamers Through Popular Titles

Kaspersky security researchers have discovered sophisticated threat actor activities that take advantage of the digitally native Gen Z population, which…

New Forensic Method Reveals Hidden Traces of RDP Exploits by Hackers
14
Jul
2025

New Forensic Method Reveals Hidden Traces of RDP Exploits by Hackers

Cybersecurity researchers have unveiled advanced techniques for tracking attackers who use Remote Desktop Protocol (RDP) to move laterally through compromised…

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload
14
Jul
2025

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload

Threat actors have exploited Microsoft Compiled HTML Help (CHM) files to distribute malware, with a notable sample named deklaracja.chm uploaded…

RenderShock 0-Click Exploit Executes Payloads Silently via Background Process
14
Jul
2025

RenderShock 0-Click Exploit Executes Payloads Silently via Background Process

A new class of cyberattack called RenderShock has been identified that can compromise enterprise systems without requiring any user interaction,…

Threats Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructre
14
Jul
2025

Threats Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructre

Threat actors, ranging from state-sponsored organizations to non-state actors, are using sophisticated cyber weapons to breach and destroy vital infrastructure…

WinRAR 0‑Day Exploit Listed for $80K on Dark Web Forum
14
Jul
2025

WinRAR 0‑Day Exploit Listed for $80K on Dark Web Forum

A sophisticated zero-day exploit targeting WinRAR, one of the world’s most popular file compression utilities, has surfaced on a dark…

Grok-4 Jailbroken Using Echo Chamber and Crescendo Exploit Combo
14
Jul
2025

Grok-4 Jailbroken Using Echo Chamber and Crescendo Exploit Combo

Security researchers have successfully demonstrated a sophisticated jailbreak attack against Grok-4, X’s advanced AI language model, by combining two powerful…