Category: GBHackers

Skitnet Malware Actively Adopted by Ransomware Gangs to Enhance Operational Efficiency
09
Jun
2025

Skitnet Malware Actively Adopted by Ransomware Gangs to Enhance Operational Efficiency

Skitnet malware, also referred to as Bossnet, has emerged as a critical tool for ransomware gangs in 2025, showcasing a…

Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials
09
Jun
2025

Google Warns of Surge in Cyberattacks Targeting US Users to Steal Login Credentials

Google has highlighted a significant uptick in cyberattacks and scams targeting US consumers, with a particular focus on stealing login…

New Blitz Malware Targets Windows Servers to Deploy Monero Miner
09
Jun
2025

New Blitz Malware Targets Windows Servers to Deploy Monero Miner

A new Windows-based malware named Blitz has been identified in 2024, with an updated version detected in early 2025. This…

Hackers Deploy FormBook Malware via Weaponized Excel Files to Target Windows Systems
09
Jun
2025

Hackers Deploy FormBook Malware via Weaponized Excel Files to Target Windows Systems

A critical phishing campaign targeting Windows users has been uncovered by FortiGuard Labs, leveraging malicious Excel attachments to exploit a…

Kettering Health Confirms Interlock Ransomware Breach and Data Theft
09
Jun
2025

Kettering Health Confirms Interlock Ransomware Breach and Data Theft

On the morning of May 20, 2025, Kettering Health, a major Ohio-based healthcare provider operating 14 medical centers and over…

New DuplexSpy RAT Gives Attackers Full Control Over Windows Machines
09
Jun
2025

New DuplexSpy RAT Gives Attackers Full Control Over Windows Machines

A new Remote Access Trojan (RAT) named DuplexSpy has surfaced, posing a significant threat to Windows-based systems worldwide. Developed in…

Multiple QNAP Flaws Allow Remote Attackers to Hijack User Accounts
09
Jun
2025

Multiple QNAP Flaws Allow Remote Attackers to Hijack User Accounts

QNAP has issued a security advisory warning users of Qsync Central about two critical vulnerabilities that could allow attackers to…

Jenkins Gatling Plugin Flaw Allows CSP Bypass, Exposing Systems to Attack
09
Jun
2025

Jenkins Gatling Plugin Flaw Allows CSP Bypass, Exposing Systems to Attack

On June 6, 2025, the Jenkins Project issued a security advisory (SECURITY-3588 / CVE-2025-5806) affecting the Gatling Plugin, a widely…

Australian Naval Operations Accidentally Jam New Zealand’s Internet and Radio
09
Jun
2025

Australian Naval Operations Accidentally Jam New Zealand’s Internet and Radio

Residents and businesses across New Zealand’s North and South Islands experienced an unexpected and widespread interruption to wireless internet and…

16 React Native Packages with Millions of Downloads Compromised Overnight
09
Jun
2025

16 React Native Packages with Millions of Downloads Compromised Overnight

Cybersecurity researchers have uncovered a large-scale attack targeting the npm ecosystem, compromising 16 popular React Native packages with a combined…

Malicious npm Utility Packages Enable Attackers to Wipe Production Systems
09
Jun
2025

Malicious npm Utility Packages Enable Attackers to Wipe Production Systems

Socket’s Threat Research Team has uncovered two malicious npm packages, express-api-sync and system-health-sync-api, designed to masquerade as legitimate utilities while…

Kali GPT-Revolutionizing Penetration Testing with AI on Kali Linux
09
Jun
2025

Kali GPT-Revolutionizing Penetration Testing with AI on Kali Linux

In the rapidly shifting digital world, cybersecurity professionals are constantly seeking innovative tools that not only streamline workflows but also…