Category: GBHackers

SCATTERED SPIDER Hackers Target IT Support Teams & Bypass Multi-Factor Authentication
04
Jun
2025

SCATTERED SPIDER Hackers Target IT Support Teams & Bypass Multi-Factor Authentication

A cybercriminal group known as SCATTERED SPIDER has emerged as a formidable threat, targeting sectors like hospitality, telecommunications, finance, and…

New Eleven11bot Hacks 86,000 IP Cameras for Large-Scale DDoS Attack
04
Jun
2025

New Eleven11bot Hacks 86,000 IP Cameras for Large-Scale DDoS Attack

The newly identified Eleven11bot malware has compromised over 86,000 IP cameras across the Asia-Pacific (APAC) region, transforming these devices into…

Lumma Infostealer Developers Persist in Their Malicious Activities
04
Jun
2025

Lumma Infostealer Developers Persist in Their Malicious Activities

A coordinated operation by Europol, the FBI, Microsoft, and other public and private sector partners targeted the Lumma infostealer, a…

Malicious 'Sleeper Agent' Browser Extensions Infected 1.5 Million Users Globally
04
Jun
2025

Malicious ‘Sleeper Agent’ Browser Extensions Infected 1.5 Million Users Globally

LayerX, a cybersecurity firm, has uncovered a sophisticated network of malicious browser extensions, dubbed “sleeper agents,” that are currently installed…

IBM QRadar Vulnerabilities Expose Sensitive Configuration Files to Attackers
04
Jun
2025

IBM QRadar Vulnerabilities Expose Sensitive Configuration Files to Attackers

IBM has issued a security bulletin highlighting multiple vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms….

Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks
04
Jun
2025

Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks

Authentication coercion remains a potent attack vector in Windows environments, enabling attackers with even low-privileged domain accounts to force targeted…

35,000 Internet-Connected Solar Power Systems Vulnerable to Cyberattacks
04
Jun
2025

35,000 Internet-Connected Solar Power Systems Vulnerable to Cyberattacks

Forescout Research Vedere Labs has uncovered that nearly 35,000 solar power devices, including inverters, data loggers, and gateways from 42…

APT37 Hackers Fake Academic Forum Invites to Deliver Malicious LNK Files via Dropbox Platform
04
Jun
2025

APT37 Hackers Fake Academic Forum Invites to Deliver Malicious LNK Files via Dropbox Platform

The North Korean state-sponsored hacking group APT37 has launched a sophisticated spear phishing campaign in March 2025, targeting activists focused…

New Malware Attack Uses Malicious Chrome & Edge Extensions to Steal Sensitive Data
04
Jun
2025

New Malware Attack Uses Malicious Chrome & Edge Extensions to Steal Sensitive Data

Cybersecurity experts from Positive Technologies’ Security Expert Center have uncovered a sophisticated malicious campaign dubbed “Phantom Enigma,” primarily targeting Brazilian…

New Crocodilus Malware Grants Full Control Over Android Devices
04
Jun
2025

New Crocodilus Malware Grants Full Control Over Android Devices

The Mobile Threat Intelligence (MTI) team identified a formidable new player in the mobile malware landscape: Crocodilus, an Android banking…

Threat Actor Bribes Overseas Support Agents to Steal Coinbase Customer Data
04
Jun
2025

Threat Actor Bribes Overseas Support Agents to Steal Coinbase Customer Data

On May 15, 2025, Coinbase, the largest U.S. cryptocurrency exchange, publicly disclosed a major security breach that exposed the sensitive…

Threat Actors Abuse 'Prove You Are Human' System to Distribute Malware
04
Jun
2025

Threat Actors Abuse ‘Prove You Are Human’ System to Distribute Malware

Threat actors have been found exploiting the ubiquitous “Prove You Are Human” verification systems to distribute malicious software. Specifically, this…