Category: GBHackers

Open-Source Rust Malware Analyzer Released by Microsoft
30
Jun
2025

Open-Source Rust Malware Analyzer Released by Microsoft

As cybercriminals and nation-state actors increasingly turn to the Rust programming language for malware development, Microsoft’s Threat Intelligence Center has…

Scattered Spider Targets Tech Companies with Phishing Frameworks like Evilginx and Social Engineering Tactics
30
Jun
2025

Scattered Spider Targets Tech Companies with Phishing Frameworks like Evilginx and Social Engineering Tactics

The notorious hacking collective Scattered Spider, also known as UNC3944 or Octo Tempest, has emerged as a formidable threat to…

Threat Actors Impersonate WPS Office and DeepSeek to Spread Sainbox RAT
30
Jun
2025

Threat Actors Impersonate WPS Office and DeepSeek to Spread Sainbox RAT

A malicious campaign has emerged, targeting Chinese-speaking users through fake installers of popular software such as WPS Office, Sogou, and…

Ahold Delhaize Data Breach Exposes Personal Information of 2.2 Million Shoppers
30
Jun
2025

Ahold Delhaize Data Breach Exposes Personal Information of 2.2 Million Shoppers

Ahold Delhaize USA Services, LLC, a major grocery retail operator, has confirmed a significant data breach that compromised the personal…

Synology ABM Vulnerability Leaks Microsoft 365 Sensitive Information
30
Jun
2025

Synology ABM Vulnerability Leaks Microsoft 365 Sensitive Information

A critical vulnerability in Synology’s Active Backup for Microsoft 365 (ABM) has exposed sensitive data from Microsoft 365 tenants worldwide, potentially impacting…

Hackers Exploit Bluetooth Flaws to Eavesdrop via Headphones and Earbuds
30
Jun
2025

Hackers Exploit Bluetooth Flaws to Eavesdrop via Headphones and Earbuds

In a major security revelation, researchers have uncovered critical vulnerabilities in millions of Bluetooth headphones and earbuds, enabling hackers to…

New Offensive Toolkit Generates Payloads to Evade AV, EDR, and XDR
30
Jun
2025

New Offensive Toolkit Generates Payloads to Evade AV, EDR, and XDR

A newly released offensive cybersecurity toolkit, Zig Strike, is making waves in the security community for its advanced ability to generate…

Threat Actors Transform GIFTEDCROOK Stealer into an Intelligence-Gathering Tool
29
Jun
2025

Threat Actors Transform GIFTEDCROOK Stealer into an Intelligence-Gathering Tool

The Arctic Wolf Labs team has uncovered a dramatic transformation in the capabilities of the GIFTEDCROOK infostealer, wielded by the…

ESET Warns Cybercriminals Are Targeting NFC Data for Contactless Payments
28
Jun
2025

ESET Warns Cybercriminals Are Targeting NFC Data for Contactless Payments

ESET researchers have uncovered a sophisticated attack vector exploiting Near Field Communication (NFC) data, initially targeting Czech banking customers but…

Threat Actors Exploit Windows and Linux Server Vulnerabilities to Deploy Web Shells
28
Jun
2025

Threat Actors Exploit Windows and Linux Server Vulnerabilities to Deploy Web Shells

Threat actors have been observed exploiting file upload vulnerabilities to deploy web shells and advanced malware on both Windows and…

Beware of Trending TikTok Videos Promoting Pirated Apps That Deliver Stealer Malware
28
Jun
2025

Beware of Trending TikTok Videos Promoting Pirated Apps That Deliver Stealer Malware

A sophisticated social engineering campaign has surfaced on TikTok, leveraging the platform’s massive user base and algorithmic reach to distribute…

Weaponized DeepSeek Installers Deploy Sainbox RAT and Hidden Rootkit
28
Jun
2025

Weaponized DeepSeek Installers Deploy Sainbox RAT and Hidden Rootkit

Netskope Threat Labs has uncovered a malicious campaign exploiting fake software installers, including those mimicking popular tools like DeepSeek, Sogou,…