Category: GBHackers

Smokeloader Malware Operators Busted, Servers Seized by Authorities
10
Apr
2025

Smokeloader Malware Operators Busted, Servers Seized by Authorities

In a major victory against cybercrime, law enforcement agencies across North America and Europe have dismantled the infrastructure behind the…

Linux Firewall IPFire 2.29 Launches with Post-Quantum Encryption and System Enhancements
10
Apr
2025

Linux Firewall IPFire 2.29 Launches with Post-Quantum Encryption and System Enhancements

The open-source Linux firewall solution, IPFire, has officially released its latest version, IPFire 2.29 – Core Update 193. This landmark update introduces…

10
Apr
2025

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers to force firewalls into repeated reboots…

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens
10
Apr
2025

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens

The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as Scattered Spider. Active since at…

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms
09
Apr
2025

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic, costing businesses millions. This type…

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums
09
Apr
2025

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal underground, revealing the intricate web…

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool
09
Apr
2025

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting scope since late December 2024….

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA
09
Apr
2025

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass multi-factor authentication (MFA) and infiltrate…

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands
09
Apr
2025

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands

North Korean threat actors have demonstrated their adept use of social engineering techniques combined with Python scripting to infiltrate secure…

New Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware
09
Apr
2025

New Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware

Cybersecurity experts have uncovered a sophisticated phishing campaign that employs a double-edged tactic to compromise Office 365 credentials and deliver…

Windows Kerberos Vulnerability Enables Security Feature Bypass
09
Apr
2025

Windows Kerberos Vulnerability Enables Security Feature Bypass

Microsoft has disclosed a new security vulnerability in Windows operating systems, tracked as CVE-2025-29809. This flaw, classified with Important severity, impacts the Kerberos…

CISA Alerts on Active Exploitation of CentreStack Hard-Coded Key Vulnerability
09
Apr
2025

CISA Alerts on Active Exploitation of CentreStack Hard-Coded Key Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert highlighting a critical vulnerability in Gladinet CentreStack, a cloud-based…