Category: GBHackers

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss
04
May
2025

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem in April 2025. Hackers have weaponized…

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques
04
May
2025

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool in the arsenal of multiple threat…

Threat Actors Use AiTM Attacks with Reverse Proxies to Bypass MFA
04
May
2025

Threat Actors Use AiTM Attacks with Reverse Proxies to Bypass MFA

Cybercriminals are intensifying their efforts to undermine multi-factor authentication (MFA) through adversary-in-the-middle (AiTM) attacks, leveraging reverse proxies to intercept sensitive…

WebDAV & SCF Exploits Fuel Credential Heists
04
May
2025

WebDAV & SCF Exploits Fuel Credential Heists

SocGholish, a notorious loader malware, has evolved into a critical tool for cybercriminals, often delivering payloads like Cobalt Strike and,…

Threat Actors Target Critical National Infrastructure with New Malware and Tools
04
May
2025

Threat Actors Target Critical National Infrastructure with New Malware and Tools

A recent investigation by the FortiGuard Incident Response (FGIR) team has uncovered a sophisticated, long-term cyber intrusion targeting critical national…

New StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts
04
May
2025

New StealC V2 Upgrade Targets Microsoft Installer Packages and PowerShell Scripts

StealC, a notorious information stealer and malware downloader first sold in January 2023, has rolled out its version 2 (V2)…

Subscription-Based Scams Targeting Users to Steal Credit Card Information
04
May
2025

Subscription-Based Scams Targeting Users to Steal Credit Card Information

Cybersecurity researchers at Bitdefender have identified a significant uptick in subscription-based scams, characterized by an unprecedented level of sophistication and…

New MCP-Based Attack Techniques and Their Application in Building Advanced Security Tools
02
May
2025

New MCP-Based Attack Techniques and Their Application in Building Advanced Security Tools

MCP, developed by Anthropic, allows Large Language Models (LLMs) to interface seamlessly with external tools, enabling the creation of agentic…

RomCom RAT Deployed Globally by Nebulous Mantis Hackers Targeting Organizations
02
May
2025

RomCom RAT Deployed Globally by Nebulous Mantis Hackers Targeting Organizations

Nebulous Mantis, also known as Cuba, STORM-0978, Tropical Scorpius, and UNC2596, is a Russian-speaking cyber espionage group that has been…

Seven Malicious Packages Exploit Gmail SMTP to Run Harmful Commands
02
May
2025

Seven Malicious Packages Exploit Gmail SMTP to Run Harmful Commands

A major supply chain security incident has rocked the Python open-source community as researchers at Socket’s Threat Research Team uncovered…

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists
02
May
2025

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Multiple Dutch organizations have experienced significant service disruptions this week due to a series of coordinated Distributed Denial-of-Service (DDoS) attacks….

Disney Hacker Admits Guilt After Stealing 1.1TB of Internal Data
02
May
2025

Disney Hacker Admits Guilt After Stealing 1.1TB of Internal Data

A 25-year-old man from Santa Clarita, California, has agreed to plead guilty to hacking into the personal computer of a…