Category: GBHackers

GrayAlpha Hacker Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT
16
Jun
2025

GrayAlpha Hacker Group Exploits Browser Updates to Deploy PowerNet Loader and NetSupport RAT

A new infrastructure linked to GrayAlpha, a cybercriminal entity overlapping with the notorious FIN7 group, has been exposed. This financially…

Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT
16
Jun
2025

Hackers Compromise Discord Invite to Inject Malicious Links Delivering AsyncRAT

Threat actors have exploited Discord’s invite system to distribute malicious links, ultimately delivering AsyncRAT and other harmful payloads. Discord, a…

Over 20 Malicious Google Play Apps Steal Users’ Login Credentials
16
Jun
2025

Over 20 Malicious Google Play Apps Steal Users’ Login Credentials

A major security alert has been issued for Android users after cybersecurity researchers uncovered more than 20 malicious applications on…

IBM Backup Services Flaw Allows Hackers to Gain Elevated Access
16
Jun
2025

IBM Backup Services Flaw Allows Hackers to Gain Elevated Access

A critical security vulnerability has been identified in IBM’s Backup, Recovery, and Media Services (BRMS) for IBM i, potentially exposing…

Uncovering the Technique of Hiding Images in DNS TXT Entries
16
Jun
2025

Uncovering the Technique of Hiding Images in DNS TXT Entries

A curious technique has emerged: hiding images inside DNS TXT records. This approach, which at first glance seems unorthodox, leverages the…

16
Jun
2025

Uncovering the Technique of Hiding Images in DNS TXT Entries

A curious technique has emerged: hiding images inside DNS TXT records. This approach, which at first glance seems unorthodox, leverages the…

Google Cloud Suffers Major Disruption After API Management Error
16
Jun
2025

Google Cloud Suffers Major Disruption After API Management Error

Google Cloud experienced one of its most significant outages in recent years, disrupting a vast array of services and impacting…

Unpatched IT Tool Opens Door
13
Jun
2025

Unpatched IT Tool Opens Door

Cybersecurity professionals and business leaders are on high alert following a confirmed breach of a utility billing software provider, traced…

Developers Beware - Sophisticated Phishing Scams Exploit GitHub Device Code Flow to Hijack Tokens
13
Jun
2025

Developers Beware – Sophisticated Phishing Scams Exploit GitHub Device Code Flow to Hijack Tokens

A sophisticated and increasing wave of cyberattacks now targets software developers through a little-known yet legitimate GitHub feature: the OAuth…

Acer Control Center Flaw Lets Attackers Run Malicious Code as Elevated User
13
Jun
2025

Acer Control Center Flaw Lets Attackers Run Malicious Code as Elevated User

A critical security flaw (CVE-2025-5491) in Acer ControlCenter allows remote attackers to execute arbitrary code with NT AUTHORITYSYSTEM privileges via…

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header
13
Jun
2025

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware’s Spring Framework has been patched, affecting multiple versions of the…

New Tools, Smartwatch and Car Hacking Added
13
Jun
2025

New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release of 2025, Kali Linux 2025.2, in…