Category: GBHackers

Open Directories Exposes Publically Available tools Used by Hackers
22
Jun
2025

Open Directories Exposes Publically Available tools Used by Hackers

A series of misconfigured web servers have been uncovered, revealing a treasure trove of publicly accessible tools and tactics employed…

Surge in XSS Cyberattacks Targets Popular Webmail Platforms, ESET Reports
21
Jun
2025

Surge in XSS Cyberattacks Targets Popular Webmail Platforms, ESET Reports

A recent report from ESET has uncovered a sophisticated cyber espionage campaign by the Russia-aligned Sednit group, targeting high-value webmail…

Microsoft Announces New Graph Powered Detection of hybrid attack Targeting Organizations
21
Jun
2025

Microsoft Announces New Graph Powered Detection of hybrid attack Targeting Organizations

Microsoft has unveiled a groundbreaking advancement in cybersecurity with the integration of the Enterprise Exposure Graph into its threat detection…

Iranian Hacktivist Attacking Israeli Military, Government, and Infrastructure Targets
21
Jun
2025

Iranian Hacktivist Attacking Israeli Military, Government, and Infrastructure Targets

Over 35 different pro-Iranian hacktivist organizations launched a coordinated attack on Israeli military, government, and key infrastructure targets in a…

TxTag Phishing Campaign Exploits .gov Domain to Deceive Employees
21
Jun
2025

TxTag Phishing Campaign Exploits .gov Domain to Deceive Employees

A new and alarming phishing campaign has surfaced, leveraging the credibility of a .gov domain to deceive employees into believing…

Threat Actors Manipulate Google Search Results to Display Scammer's Phone Number Instead of Real Number
21
Jun
2025

Threat Actors Manipulate Google Search Results to Display Scammer’s Phone Number Instead of Real Number

Threat actors are increasingly exploiting the trust users place in sponsored search results on platforms like Google to orchestrate sophisticated…

Beware of Weaponized MSI Installer Masquerading as WhatsApp to Deliver XWorm RAT
21
Jun
2025

Beware of Weaponized MSI Installer Masquerading as WhatsApp to Deliver XWorm RAT

A newly identified cyber threat linked to a China-based threat actor has emerged, targeting users across East and Southeast Asia…

Hackers Target 700+ ComfyUI AI Image Generation Servers to Spread Malware
21
Jun
2025

Hackers Target 700+ ComfyUI AI Image Generation Servers to Spread Malware

China’s National Cybersecurity Notification Center has issued an urgent warning about critical vulnerabilities in ComfyUI, a widely used image-generation framework…

Cyberattack Disrupts Russian Dairy Supply Chain by Targeting Animal Certification System
21
Jun
2025

Cyberattack Disrupts Russian Dairy Supply Chain by Targeting Animal Certification System

In a Russia’s dairy supply chain, a suspected cyberattack has targeted the Mercury component of the national veterinary certification system,…

Prometei Botnet Targets Linux Servers for Cryptocurrency Mining Operations
20
Jun
2025

Prometei Botnet Targets Linux Servers for Cryptocurrency Mining Operations

Unit 42 researchers from Palo Alto Networks have identified a renewed wave of attacks by the Prometei botnet, specifically targeting…

Mocha Manakin Uses Paste-and-Run Technique to Deceive Users into Downloading Malware
20
Jun
2025

Mocha Manakin Uses Paste-and-Run Technique to Deceive Users into Downloading Malware

A malicious campaign tracked as Mocha Manakin has been identified employing the deceptive “paste-and-run” technique to trick unsuspecting users into…

Insomnia API Client Vulnerability Enables Arbitrary Code Execution via Template Injection
20
Jun
2025

Insomnia API Client Vulnerability Enables Arbitrary Code Execution via Template Injection

A severe security vulnerability in the Insomnia API Client, a widely used tool by developers and security testers for interacting…