Category: GBHackers

Two Methods to Root Qualcomm-Based Android Phones
30
Apr
2025

Two Methods to Root Qualcomm-Based Android Phones

Security researchers have exposed critical vulnerabilities in Qualcomm GPU drivers, impacting a vast array of Android devices from brands like…

Verizon 2025 Report Highlights Surge in Cyberattacks Through Third Parties
30
Apr
2025

Verizon 2025 Report Highlights Surge in Cyberattacks Through Third Parties

Verizon Business unveiled its 2025 Data Breach Investigations Report (DBIR) today, painting a stark picture of the escalating cyber threat…

20.5 Million DDoS Barrage Shattered Records Leading Attack Fired Off 4.8 Billion Packets
30
Apr
2025

20.5 Million DDoS Barrage Shattered Records Leading Attack Fired Off 4.8 Billion Packets

Cloudflare’s latest DDoS Threat Report for the first quarter of 2025 reveals that the company mitigated a record-shattering 20.5 million…

New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials
30
Apr
2025

New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials

A formidable new information-stealing malware dubbed Gremlin Stealer has surfaced in the cybercrime underground, actively promoted since mid-March 2025 on…

Google Reports 75 Zero-Day Vulnerabilities Actively Exploited in the Wild
29
Apr
2025

Google Reports 75 Zero-Day Vulnerabilities Actively Exploited in the Wild

In a comprehensive report released by the Google Threat Intelligence Group (GTIG), 75 zero-day vulnerabilities were identified as actively exploited…

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware
29
Apr
2025

Outlaw Cybergang Launches Global Attacks on Linux Environments with New Malware

The Outlaw cybergang, also known as “Dota,” has intensified its global assault on Linux environments, exploiting weak or default SSH…

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software
29
Apr
2025

Cyber Espionage Campaign Targets Uyghur Exiles with Trojanized Language Software

A sophisticated cyberattack targeted senior members of the World Uyghur Congress (WUC), the largest Uyghur diaspora organization, using a weaponized…

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories
29
Apr
2025

Researchers Uncover SuperShell Payloads and Various Tools in Hacker’s Open Directories

Cybersecurity researchers at Hunt have uncovered a server hosting advanced malicious tools, including SuperShell command-and-control (C2) payloads and a Linux…

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks
29
Apr
2025

Konni APT Deploys Multi-Stage Malware in Targeted Organizational Attacks

A sophisticated multi-stage malware campaign, potentially orchestrated by the North Korean Konni Advanced Persistent Threat (APT) group, has been identified…

Cybercriminals Use GetShared to Sneak Malware Through Enterprise Shields
29
Apr
2025

Cybercriminals Use GetShared to Sneak Malware Through Enterprise Shields

Cybercriminals are increasingly leveraging legitimate file-sharing platforms like GetShared to bypass enterprise email security systems. A recent case involving a…

Threat Actors Accelerate Transition from Reconnaissance to Compromise
29
Apr
2025

Threat Actors Accelerate Transition from Reconnaissance to Compromise

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from reconnaissance to compromise. The data shows…

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions
29
Apr
2025

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting the Mojo inter-process communication (IPC) component…