Category: GBHackers

Inside Turla’s Uroboros Infrastructure and Tactics Revealed
15
May
2025

Inside Turla’s Uroboros Infrastructure and Tactics Revealed

In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed to the infamous APT group Turla,…

Hackers Steal Customers Banking Details in Nova Scotia Cyber Attack
15
May
2025

Hackers Steal Customers Banking Details in Nova Scotia Cyber Attack

Nova Scotia Power has confirmed that hackers infiltrated its IT infrastructure and exfiltrated sensitive customer data, including banking details from…

New .NET Multi-Stage Loader Targets Windows Systems to Deploy Malicious Payloads
15
May
2025

New .NET Multi-Stage Loader Targets Windows Systems to Deploy Malicious Payloads

A recently discovered .NET-based multi-stage loader has caught the attention of cybersecurity researchers due to its complex architecture and ability…

Nucor Steel Manufacturer Halts Production After Cyberattack
15
May
2025

Nucor Steel Manufacturer Halts Production After Cyberattack

Nucor Corporation, one of North America’s largest steel producers, has temporarily halted production at multiple facilities following a cybersecurity breach…

Russian Hackers Exploit XSS Vulnerabilities to Inject Malicious Code into Email Servers
15
May
2025

Russian Hackers Exploit XSS Vulnerabilities to Inject Malicious Code into Email Servers

A sophisticated cyberespionage campaign, dubbed Operation RoundPress, has been uncovered by cybersecurity researchers at ESET. Attributed with medium confidence to…

TransferLoader Malware Enables Attackers to Execute Arbitrary Commands on Infected Systems
15
May
2025

TransferLoader Malware Enables Attackers to Execute Arbitrary Commands on Infected Systems

A formidable new malware loader, dubbed TransferLoader, has emerged as a significant cybersecurity threat, as detailed in a recent report…

Bitpixie Vulnerability Proof of Concept Unveiled
15
May
2025

Bitpixie Vulnerability Proof of Concept Unveiled

Security researchers have demonstrated a non-invasive method to bypass Microsoft BitLocker encryption on Windows devices in just five minutes without…

Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild
15
May
2025

Google Chrome Zero-Day Vulnerability (CVE-2025-4664) Actively Exploited in The Wild

Google has rolled out a fresh Stable Channel update for the Chrome browser across desktop platforms, including Windows, Mac, and…

Critical Microsoft Outlook Flaw Enables Remote Execution of Arbitrary Code
14
May
2025

Critical Microsoft Outlook Flaw Enables Remote Execution of Arbitrary Code

Newly disclosed vulnerability in Microsoft Outlook (CVE-2025-32705) permits attackers to execute arbitrary code on compromised systems through a memory corruption…

Katz Stealer Malware Hits 78+ Chromium and Gecko-Based Browsers
14
May
2025

Katz Stealer Malware Hits 78+ Chromium and Gecko-Based Browsers

Newly disclosed information-stealing malware dubbed Katz Stealer has emerged as a significant threat to users of Chromium and Gecko-based browsers,…

New HTTPBot Botnet Rapidly Expands to Target Windows Machines
14
May
2025

New HTTPBot Botnet Rapidly Expands to Target Windows Machines

The HTTPBot Botnet, a novel Trojan developed in the Go programming language, has seen a sharp rise in activity since…

Severe Adobe Illustrator Flaw Allows Remote Code Execution
14
May
2025

Severe Adobe Illustrator Flaw Allows Remote Code Execution

Adobe has issued an urgent security update for its widely used graphic design software, Adobe Illustrator, following the discovery of…