Category: GBHackers

Malicious 'Sleeper Agent' Browser Extensions Infected 1.5 Million Users Globally
04
Jun
2025

Malicious ‘Sleeper Agent’ Browser Extensions Infected 1.5 Million Users Globally

LayerX, a cybersecurity firm, has uncovered a sophisticated network of malicious browser extensions, dubbed “sleeper agents,” that are currently installed…

IBM QRadar Vulnerabilities Expose Sensitive Configuration Files to Attackers
04
Jun
2025

IBM QRadar Vulnerabilities Expose Sensitive Configuration Files to Attackers

IBM has issued a security bulletin highlighting multiple vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms….

Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks
04
Jun
2025

Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks

Authentication coercion remains a potent attack vector in Windows environments, enabling attackers with even low-privileged domain accounts to force targeted…

35,000 Internet-Connected Solar Power Systems Vulnerable to Cyberattacks
04
Jun
2025

35,000 Internet-Connected Solar Power Systems Vulnerable to Cyberattacks

Forescout Research Vedere Labs has uncovered that nearly 35,000 solar power devices, including inverters, data loggers, and gateways from 42…

APT37 Hackers Fake Academic Forum Invites to Deliver Malicious LNK Files via Dropbox Platform
04
Jun
2025

APT37 Hackers Fake Academic Forum Invites to Deliver Malicious LNK Files via Dropbox Platform

The North Korean state-sponsored hacking group APT37 has launched a sophisticated spear phishing campaign in March 2025, targeting activists focused…

New Malware Attack Uses Malicious Chrome & Edge Extensions to Steal Sensitive Data
04
Jun
2025

New Malware Attack Uses Malicious Chrome & Edge Extensions to Steal Sensitive Data

Cybersecurity experts from Positive Technologies’ Security Expert Center have uncovered a sophisticated malicious campaign dubbed “Phantom Enigma,” primarily targeting Brazilian…

New Crocodilus Malware Grants Full Control Over Android Devices
04
Jun
2025

New Crocodilus Malware Grants Full Control Over Android Devices

The Mobile Threat Intelligence (MTI) team identified a formidable new player in the mobile malware landscape: Crocodilus, an Android banking…

Threat Actor Bribes Overseas Support Agents to Steal Coinbase Customer Data
04
Jun
2025

Threat Actor Bribes Overseas Support Agents to Steal Coinbase Customer Data

On May 15, 2025, Coinbase, the largest U.S. cryptocurrency exchange, publicly disclosed a major security breach that exposed the sensitive…

Threat Actors Abuse 'Prove You Are Human' System to Distribute Malware
04
Jun
2025

Threat Actors Abuse ‘Prove You Are Human’ System to Distribute Malware

Threat actors have been found exploiting the ubiquitous “Prove You Are Human” verification systems to distribute malicious software. Specifically, this…

Hackers Exploit Ruby Gems to Steal Telegram Tokens and Messages
04
Jun
2025

Hackers Exploit Ruby Gems to Steal Telegram Tokens and Messages

Researchers have unearthed a sophisticated supply chain attack targeting Ruby Gems, a popular package manager for the Ruby programming language….

Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks
04
Jun
2025

Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks

Active Directory (AD) Group Policy Objects (GPOs) are a cornerstone of centralized management for Windows environments, enabling administrators to configure…

DollyWay World Domination Attack Compromises 20,000+ Sites
04
Jun
2025

DollyWay World Domination Attack Compromises 20,000+ Sites

Since 2016, the “DollyWay World Domination” campaign has quietly compromised more than 20,000 WordPress websites worldwide, exploiting vulnerabilities in plugins…