Category: GBHackers

Gorilla Android Malware Intercepts SMS to Steal One-Time Passwords
19
Apr
2025

Gorilla Android Malware Intercepts SMS to Steal One-Time Passwords

In a concerning development within the Android ecosystem, a new malware variant known as “Gorilla” has been identified, primarily targeting…

10 Best Cloud Security Solutions 2025
19
Apr
2025

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing to store data, run applications, and manage infrastructure. However, as…

10 Best Patch Management Tools in 2025
19
Apr
2025

10 Best Patch Management Tools in 2025

In today’s digital landscape, maintaining secure and efficient IT systems is critical for organizations. Patch management tools play a vital…

SheByte PaaS Launches $199 Subscription Service for Cybercriminals
19
Apr
2025

SheByte PaaS Launches $199 Subscription Service for Cybercriminals

The landscape of cyber threats targeting Canadian financial institutions saw significant shifts after LabHost, a prominent phishing-as-a-service (PhaaS) platform, was…

Chinese Nexus Hackers Exploit Ivanti Connect Secure Flaw to Gain Access
19
Apr
2025

Chinese Nexus Hackers Exploit Ivanti Connect Secure Flaw to Gain Access

In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus, has exploited a critical vulnerability in…

New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions
19
Apr
2025

New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions

A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field Communication (NFC)-relay attack to execute unauthorized…

How To Hunt Web And Network-Based Threats From Packet Capture To Payload
19
Apr
2025

How To Hunt Web And Network-Based Threats From Packet Capture To Payload

Modern cyberattacks increasingly exploit network protocols and web applications to bypass traditional security controls. To counter these threats, security teams…

How SMBs Can Improve SOC Maturity With Limited Resources
19
Apr
2025

How SMBs Can Improve SOC Maturity With Limited Resources

Small and Medium-sized Businesses (SMBs) have become prime targets for cybercriminals, being three times more likely to be targeted by…

How to Detect and Prevent DNS Tunneling Attack In Enterprise Networks
19
Apr
2025

How to Detect and Prevent DNS Tunneling Attack In Enterprise Networks

DNS tunneling represents one of the most sophisticated attack vectors targeting enterprise networks today, leveraging the trusted Domain Name System…

How To Detect Obfuscated Malware That Evades Static Analysis Tools
19
Apr
2025

How To Detect Obfuscated Malware That Evades Static Analysis Tools

Obfuscated malware presents one of the most challenging threats in cybersecurity today. As static analysis tools have become standard components…

PoC Released for Linux Kernel Vulnerability Allowing Privilege Escalation
18
Apr
2025

PoC Released for Linux Kernel Vulnerability Allowing Privilege Escalation

A security vulnerability, tracked as CVE-2024-53141, has recently come to light in the Linux kernel’s ipset component. This flaw enables out-of-bounds…

Full Remote Access to Monitor Any Activity
18
Apr
2025

Full Remote Access to Monitor Any Activity

Threat intelligence experts at Perplexity uncovered an advanced variant of the SpyMax/SpyNote family of Android spyware, cleverly disguised as the…