Category: GBHackers

Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses
16
May
2025

Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses

Cybersecurity researchers have uncovered a growing trend in which threat actors are exploiting Microsoft PowerShell a legitimate Windows command-line interface…

Tor Oniux Tool Offers Anonymous Linux App Traffic
16
May
2025

Tor Oniux Tool Offers Anonymous Linux App Traffic

Tor Project has unveiled oniux, a new command-line utility that provides comprehensive network isolation for Linux applications, ensuring all traffic…

Proofpoint Buys Hornetsecurity, A Microsoft 365 Security Specialist For $1 Billion
16
May
2025

Proofpoint Buys Hornetsecurity, A Microsoft 365 Security Specialist For $1 Billion

Cybersecurity giant Proofpoint has announced its agreement to acquire Hornetsecurity Group, a leading European provider of AI-powered Microsoft 365 security…

CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products
15
May
2025

CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding five zero-day vulnerabilities affecting multiple Fortinet…

Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors
15
May
2025

Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors

Major victory against online crime, two of the world’s largest illicit marketplaces-Huione Guarantee (also known as “Haowang Guarantee”) and Xinbi…

Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks
15
May
2025

Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks

The Socket Threat Research Team has uncovered a surge in supply chain attacks where threat actors weaponize open source software…

Hackers Exploit Google Services to Send Malicious Law Enforcement Requests
15
May
2025

Hackers Exploit Google Services to Send Malicious Law Enforcement Requests

Cybersecurity researchers have uncovered a sophisticated phishing campaign where malicious actors exploit Google services to dispatch fraudulent law enforcement requests….

Coinbase Data Breach - Customers Personal Info, Government‑ID & Account Data Exposed
15
May
2025

Coinbase Data Breach – Customers Personal Info, Government‑ID & Account Data Exposed

Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity incident that could cost the company…

CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited
15
May
2025

CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited

Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified Windows 0-day…

Inside Turla’s Uroboros Infrastructure and Tactics Revealed
15
May
2025

Inside Turla’s Uroboros Infrastructure and Tactics Revealed

In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed to the infamous APT group Turla,…

Hackers Steal Customers Banking Details in Nova Scotia Cyber Attack
15
May
2025

Hackers Steal Customers Banking Details in Nova Scotia Cyber Attack

Nova Scotia Power has confirmed that hackers infiltrated its IT infrastructure and exfiltrated sensitive customer data, including banking details from…

New .NET Multi-Stage Loader Targets Windows Systems to Deploy Malicious Payloads
15
May
2025

New .NET Multi-Stage Loader Targets Windows Systems to Deploy Malicious Payloads

A recently discovered .NET-based multi-stage loader has caught the attention of cybersecurity researchers due to its complex architecture and ability…