Category: GBHackers

New Capabilities and Exfiltration Techniques Exposed
29
Jul
2025

New Capabilities and Exfiltration Techniques Exposed

In the ever-evolving infostealer landscape, 0bj3ctivityStealer emerges as a formidable threat, blending advanced obfuscation with targeted data exfiltration. Discovered earlier…

ToxicPanda Android Banking Malware Compromises Over 4,500 Devices to Harvest Banking Credentials
29
Jul
2025

ToxicPanda Android Banking Malware Compromises Over 4,500 Devices to Harvest Banking Credentials

The ToxicPanda Android banking trojan has emerged as a significant threat, compromising over 4,500 devices primarily in Portugal and Spain…

Lazarus Subgroup 'TraderTraitor' Targets Cloud Platforms and Contaminates Supply Chains
29
Jul
2025

Lazarus Subgroup ‘TraderTraitor’ Targets Cloud Platforms and Contaminates Supply Chains

The North Korean state-sponsored advanced persistent threat (APT) known as TraderTraitor, a subgroup of the notorious Lazarus Group, has emerged…

Infection Chain and Escalation Tactics Exposed
29
Jul
2025

Infection Chain and Escalation Tactics Exposed

Lumma, a sophisticated C++-based information stealer, has surged in prevalence over recent years, posing significant risks to both individuals and…

SquareX Discloses Architectural Limitations Of Browser DevTools In Debugging Malicious Extensions
29
Jul
2025

SquareX Discloses Architectural Limitations Of Browser DevTools In Debugging Malicious Extensions

Palo Alto, California, July 29th, 2025, CyberNewsWire Despite the expanding use of browser extensions, the majority of enterprises and individuals…

Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems
29
Jul
2025

Gemini CLI Vulnerability Allows Silent Execution of Malicious Commands on Developer Systems

Security researchers at Tracebit have discovered a critical vulnerability in Google’s Gemini CLI that enables attackers to silently execute malicious…

Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities
29
Jul
2025

Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities

Security researchers have disclosed technical details of three previously patched vulnerabilities affecting SonicWall’s SMA100 series SSL-VPN appliances, highlighting concerning pre-authentication…

Microsoft Teams Introduces New Join Bar to Help Users Join Meetings on Time
29
Jul
2025

Microsoft Teams Introduces New Join Bar to Help Users Join Meetings on Time

Microsoft Teams is rolling out a new meeting join banner designed to streamline the meeting experience for users who have…

PyPI Alerts Developers to New Phishing Attack Using Fake PyPI Site
29
Jul
2025

PyPI Alerts Developers to New Phishing Attack Using Fake PyPI Site

Python developers are being warned about a sophisticated phishing campaign targeting users of the Python Package Index (PyPI) through fraudulent…

Linux 6.16 Released with Performance and Networking Enhancements
29
Jul
2025

Linux 6.16 Released with Performance and Networking Enhancements

Linux creator Linus Torvalds announced the release of Linux kernel version 6.16 on July 27, 2025, marking the end of…

Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web
29
Jul
2025

Lionishackers Exfiltrate Sensitive Corporate Databases for Sale on the Dark Web

Outpost24’s threat intelligence researchers have uncovered the operations of Lionishackers, a financially motivated cyber threat actor specializing in the exfiltration…

New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC
29
Jul
2025

New macOS Vulnerability Allows Attackers to Steal Private Files by Bypassing TCC

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that enables attackers to bypass Apple’s Transparency, Consent, and Control (TCC)…