Category: GBHackers

North Korean Kimsuky and Lazarus Teams Target Critical Sectors with Zero-Day Exploits
21
Nov
2025

North Korean Kimsuky and Lazarus Teams Target Critical Sectors with Zero-Day Exploits

North Korea’s two most formidable APT groups Kimsuky and Lazarus have established a coordinated operational framework that combines intelligence gathering…

Dark Web Job Market Evolved
21
Nov
2025

Dark Web Job Market Evolved

The underground labor market has undergone a significant transformation. According to new research analyzing 2,225 job-related posts collected from shadow…

AI-Driven Obfuscated Malicious Apps Bypassing Antivirus Detection to Deliver Malicious Payloads
21
Nov
2025

AI-Driven Obfuscated Malicious Apps Bypassing Antivirus Detection to Deliver Malicious Payloads

Cybersecurity researchers have identified a sophisticated malware campaign leveraging artificial intelligence to enhance obfuscation techniques, enabling malicious applications to circumvent…

Advanced Features Bypass AI Detection and Steal Password Manager Data
21
Nov
2025

Advanced Features Bypass AI Detection and Steal Password Manager Data

The Python-based information-stealing tool Xillen Stealer has reached versions 4 and 5, significantly expanding its targeting capabilities and functionality across…

Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Gain Higher Privileges
21
Nov
2025

Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Gain Higher Privileges

Microsoft disclosed a critical authentication bypass vulnerability in Azure Bastion, its managed remote access service, enabling attackers to escalate privileges…

Windows Graphics Flaw Lets Hackers Take Over with Just One Image
21
Nov
2025

Windows Graphics Flaw Lets Hackers Take Over with Just One Image

Security researchers have identified a dangerous flaw in the Windows Graphics Component that enables attackers to seize complete control of…

APT24 Deploys New BadAudio Malware, Hijacks Legitimate Public Sites to Launch Attacks
21
Nov
2025

APT24 Deploys New BadAudio Malware, Hijacks Legitimate Public Sites to Launch Attacks

The Google Threat Intelligence Group (GTIG) has unveiled a sophisticated three-year cyber espionage campaign orchestrated by APT24, a China-nexus threat…

Ransomware Attacks Poised to Hit Retailers Hard This Holiday Season
21
Nov
2025

Ransomware Attacks Poised to Hit Retailers Hard This Holiday Season

The holiday shopping rush has always been the retail industry’s busiest and riskiest time of year. As e-commerce traffic, in-store…

Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware
21
Nov
2025

Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware

Security researchers at the AhnLab Security Intelligence Center (ASEC) have uncovered a sophisticated cyberattack campaign targeting Microsoft Windows Server Update…

Clop Ransomware Claims Oracle Breach Using E-Business Suite 0-Day
21
Nov
2025

Clop Ransomware Claims Oracle Breach Using E-Business Suite 0-Day

The notorious Clop ransomware gang, also known as Graceful Spider, has listed Oracle Corporation on its dark web leak site,…

Salesforce Confirms Customer Data Was Exposed in Gainsight Breach
21
Nov
2025

Salesforce Confirms Customer Data Was Exposed in Gainsight Breach

Salesforce has identified unusual activity involving applications published by Gainsight that are connected to the Salesforce platform. The company’s investigation…

Operation DreamJob Attacks on Manufacturing via WhatsApp Web - GBHackers Security
21
Nov
2025

Operation DreamJob Attacks on Manufacturing via WhatsApp Web – GBHackers Security

Operation DreamJob, a longstanding North Korean cyberespionage campaign, has once again demonstrated its lethal effectiveness by targeting manufacturing organizations through…