Category: GBHackers

Operation DreamJob Attacks on Manufacturing via WhatsApp Web - GBHackers Security
21
Nov
2025

Operation DreamJob Attacks on Manufacturing via WhatsApp Web – GBHackers Security

Operation DreamJob, a longstanding North Korean cyberespionage campaign, has once again demonstrated its lethal effectiveness by targeting manufacturing organizations through…

Critical Grafana Flaw Lets Attackers Escalate Privileges
21
Nov
2025

Critical Grafana Flaw Lets Attackers Escalate Privileges

Grafana Labs has released critical security patches addressing a severe vulnerability in its SCIM provisioning feature that could allow attackers…

Milvus Proxy Flaw Lets Attackers Forge Headers and Skip Authorization
21
Nov
2025

Milvus Proxy Flaw Lets Attackers Forge Headers and Skip Authorization

A critical authentication bypass vulnerability in the Milvus vector database could allow attackers to gain administrative access without credentials. The…

Authorities Sanction Russia-Based Bulletproof Hosting Provider for Aiding Ransomware
21
Nov
2025

Authorities Sanction Russia-Based Bulletproof Hosting Provider for Aiding Ransomware

The United States, Australia, and the United Kingdom have announced coordinated sanctions against Media Land, a Russia-based bulletproof hosting provider,…

Pi GPT Tool Turns Raspberry Pi into a ChatGPT-Powered Smart Device
21
Nov
2025

Pi GPT Tool Turns Raspberry Pi into a ChatGPT-Powered Smart Device

noBGP has launched pi GPT, a groundbreaking integration that transforms Raspberry Pi devices into ChatGPT-controlled development and production environments. The…

Massive Hacking Operation WrtHug Compromises Thousands of ASUS Routers Worldwide
21
Nov
2025

Massive Hacking Operation WrtHug Compromises Thousands of ASUS Routers Worldwide

Your home router, the device connecting you to the internet, may have been silently compromised as part of a coordinated…

TamperedChef Campaign Exploits Everyday Apps to Deploy Malware and Enable Remote Access
21
Nov
2025

TamperedChef Campaign Exploits Everyday Apps to Deploy Malware and Enable Remote Access

The Acronis Threat Research Unit has uncovered a sophisticated global malvertising campaign called TamperedChef that disguises malware as legitimate everyday…

Emerging Ransomware Variants Exploit Amazon S3 Misconfigurations
21
Nov
2025

Emerging Ransomware Variants Exploit Amazon S3 Misconfigurations

Ransomware is shifting from traditional systems to cloud environments, fundamentally redefining its impact on cloud-native data. As organizations increasingly migrate…

CISA Alerts Users to Active Attacks on Chrome 0-Day Vulnerability
21
Nov
2025

CISA Alerts Users to Active Attacks on Chrome 0-Day Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Google Chrome to its Known Exploited Vulnerabilities…

Sturnus Malware Hijacks Signal and WhatsApp, Taking Full Device Control
21
Nov
2025

Sturnus Malware Hijacks Signal and WhatsApp, Taking Full Device Control

MTI Security researchers have uncovered a new, particularly advanced Android banking trojan, dubbed Sturnus, that targets users’ financial and personal…

Samourai Wallet Founders Jailed for $237M Crypto Laundering
21
Nov
2025

Samourai Wallet Founders Jailed for $237M Crypto Laundering

The co-founders of Samourai Wallet, a cryptocurrency mixing service that facilitated over $237 million in illegal transactions, have been sentenced…

Tsundere Botnet Targets Windows, Linux & macOS via Node.js Packages
20
Nov
2025

Tsundere Botnet Targets Windows, Linux & macOS via Node.js Packages

A Russian-speaking threat actor attributed to the username “koneko” has resurfaced with a sophisticated new botnet named Tsundere, discovered by…