Category: GBHackers

Gunra Ransomware’s Double‑Extortion Playbook and Global Impact
05
May
2025

Gunra Ransomware’s Double‑Extortion Playbook and Global Impact

Gunra Ransomware, has surfaced as a formidable threat in April 2025, targeting Windows systems across industries such as real estate,…

RomCom RAT Targets UK Organizations Through Compromised Customer Feedback Portals
05
May
2025

RomCom RAT Targets UK Organizations Through Compromised Customer Feedback Portals

The Russian-based threat group RomCom, also known as Storm-0978, Tropical Scorpius, and Void Rabisu, has been targeting UK companies in…

Outsmarting Antivirus, Firewalls, and Human Defenses
05
May
2025

Outsmarting Antivirus, Firewalls, and Human Defenses

X Business, a small e-commerce store dealing in handmade home décor, became the latest victim of a devastating cyberattack orchestrated…

xAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMs
05
May
2025

xAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMs

An employee at Elon Musk’s artificial intelligence venture, xAI, inadvertently disclosed a sensitive API key on GitHub, potentially exposing proprietary…

Multiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access
05
May
2025

Multiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access

Security researchers have uncovered a series of critical vulnerabilities in the Tenda RX2 Pro Dual-Band Gigabit Wi-Fi 6 Router (Firmware…

North Korean Hacker Tries to Infiltrate Kraken Through Job Application
05
May
2025

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by a suspected North Korean hacker posing…

Apache Parquet Java Vulnerability Enables Remote Code Execution
05
May
2025

Apache Parquet Java Vulnerability Enables Remote Code Execution

A high-severity vulnerability (CVE-2025-46762) has been discovered in Apache Parquet Java, exposing systems using the parquet-avro module to remote code…

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks
05
May
2025

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site scripting (XSS) and server-side request forgery (SSRF) attacks. These…

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims
05
May
2025

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed a surge in malicious activity tied…

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis
05
May
2025

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft’s WinDbg, dramatically simplifying Windows crash dump analysis. For…

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control
05
May
2025

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the “SonicBoom Attack Chain,” which allows hackers to bypass authentication…

NCSC Warns of Ransomware Attacks Targeting UK organisations
05
May
2025

NCSC Warns of Ransomware Attacks Targeting UK organisations

National Cyber Security Centre (NCSC) has issued technical guidance following a series of cyber attacks targeting UK retailers. These incidents…