Category: GBHackers

Attackers Swap ‘m’ with ‘rn’ in Microsoft.com to Trick Users
25
Nov
2025

Attackers Swap ‘m’ with ‘rn’ in Microsoft.com to Trick Users

A sophisticated phishing campaign is currently exploiting a subtle typographical illusion to deceive users into surrendering sensitive login credentials. Cybercriminals…

Hackers Leveraging WhatsApp to Silently Harvest Logs and Contact Details
25
Nov
2025

Hackers Leveraging WhatsApp to Silently Harvest Logs and Contact Details

Security researchers at K7 Labs have uncovered a sophisticated phishing campaign targeting Brazilian users that exploits WhatsApp Web to distribute…

Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
25
Nov
2025

Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention

Tel Aviv, Israel, November 24th, 2025, CyberNewsWire Blast is introducing a new operating model for cloud security with a first-of-its-kind…

ToddyCat APT Targeting Internal Employee Communications at Organizations
24
Nov
2025

ToddyCat APT Targeting Internal Employee Communications at Organizations

Advanced persistent threat actors continue to develop sophisticated techniques for compromising corporate communications, with the ToddyCat APT group demonstrating remarkable…

Tenda N300 Flaws Allow Attackers to Run Commands as Root
24
Nov
2025

Tenda N300 Flaws Allow Attackers to Run Commands as Root

High command injection vulnerabilities have been discovered in Tenda’s N300 Wi-Fi 4G LTE Router and the 4G03 Pro model, allowing…

North Korean Scam Job Platform Targets U.S. AI Developers
24
Nov
2025

North Korean Scam Job Platform Targets U.S. AI Developers

A sophisticated new variant of the North Korean-linked Contagious Interview campaign has emerged, featuring an unprecedented level of polish and…

New EtherHiding Technique Uses Web Attacks to Deploy Malware and Rotate Payloads
24
Nov
2025

New EtherHiding Technique Uses Web Attacks to Deploy Malware and Rotate Payloads

A new era of web-delivered malware has arrived with EtherHiding, a technique that fundamentally reshapes how attackers distribute and rotate…

Malicious PyPI Package Used by Hackers to Steal Users’ Crypto Information
24
Nov
2025

Malicious PyPI Package Used by Hackers to Steal Users’ Crypto Information

Cybersecurity researchers have uncovered a sophisticated supply-chain attack targeting Python developers through a malicious package distributed via the Python Package…

PoC Published for W3 Total Cache Flaw Exposing 1M+ Sites to RCE
24
Nov
2025

PoC Published for W3 Total Cache Flaw Exposing 1M+ Sites to RCE

Security researchers have published a proof-of-concept exploit for a critical remote code execution vulnerability in W3 Total Cache, one of…

Iberia Airlines Hit by Data Breach Exposing Customer Personal Details
24
Nov
2025

Iberia Airlines Hit by Data Breach Exposing Customer Personal Details

Iberia Líneas Aéreas de España has disclosed a significant security incident involving unauthorized access to systems operated by an external…

Linux 6.18-rc7 Released With New Bug Fixes and Driver Updates
24
Nov
2025

Linux 6.18-rc7 Released With New Bug Fixes and Driver Updates

The Linux kernel development team has released version 6.18-rc7, marking another step toward the final 6.18 release expected next weekend….

Zapier’s NPM Account Hacked, Multiple Packages Infected with Malware
24
Nov
2025

Zapier’s NPM Account Hacked, Multiple Packages Infected with Malware

Zapier’s NPM account has been successfully compromised, leading to the injection of the Shai Hulud malware into 425 packages currently…