Category: GBHackers

Hackers Exploit Ruby Gems to Steal Telegram Tokens and Messages
04
Jun
2025

Hackers Exploit Ruby Gems to Steal Telegram Tokens and Messages

Researchers have unearthed a sophisticated supply chain attack targeting Ruby Gems, a popular package manager for the Ruby programming language….

Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks
04
Jun
2025

Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks

Active Directory (AD) Group Policy Objects (GPOs) are a cornerstone of centralized management for Windows environments, enabling administrators to configure…

DollyWay World Domination Attack Compromises 20,000+ Sites
04
Jun
2025

DollyWay World Domination Attack Compromises 20,000+ Sites

Since 2016, the “DollyWay World Domination” campaign has quietly compromised more than 20,000 WordPress websites worldwide, exploiting vulnerabilities in plugins…

CISA Alerts on ConnectWise ScreenConnect Authentication Vulnerability Actively Exploited
03
Jun
2025

CISA Alerts on ConnectWise ScreenConnect Authentication Vulnerability Actively Exploited

A critical improper authentication vulnerability has been discovered in ConnectWise ScreenConnect, tracked as CVE-2025-3935 and mapped to CWE-287 (Improper Authentication)….

North Face Fashion Brand Alerts Customers to Credential Stuffing Attack
03
Jun
2025

North Face Fashion Brand Alerts Customers to Credential Stuffing Attack

The North Face, a prominent outdoor fashion brand under VF Outdoor, LLC, detected unusual activity on its website, thenorthface.com. Following…

Android Security Update Addresses High-Severity Privilege Escalation Flaws
03
Jun
2025

Android Security Update Addresses High-Severity Privilege Escalation Flaws

The Android Security Bulletin for June 2025, published on June 2, details a series of high-severity vulnerabilities affecting a wide…

State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems
03
Jun
2025

State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems

The manufacturing sector has emerged as a prime target for cyber attackers in 2024, with a staggering 71% surge in…

Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis
03
Jun
2025

Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis

Cybersecurity researchers have shed light on the often-underestimated vulnerabilities in containerized environments, emphasizing the critical role of host-based log analysis…

New Linux PumaBot Targets IoT Devices with SSH Credential Brute-Force Attack
03
Jun
2025

New Linux PumaBot Targets IoT Devices with SSH Credential Brute-Force Attack

A new and insidious threat has surfaced in the cybersecurity landscape as Darktrace’s Threat Research team uncovers PumaBot, a Go-based…

Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data
03
Jun
2025

Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data

A pro-Ukrainian hacktivist group known as BO Team, also operating under aliases such as Black Owl, Lifting Zmiy, and Hoody…

Top Russian Dark Web Market Tools Drive Surge in Credential Theft Attacks
03
Jun
2025

Top Russian Dark Web Market Tools Drive Surge in Credential Theft Attacks

In a chilling revelation for cybersecurity professionals, the Russian Market has solidified its position as the leading hub for stolen…

Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities
03
Jun
2025

Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities

Aembit, the workload identity and access management (IAM) company, today announced a major expansion of its platform to support Microsoft…