Category: GBHackers

Threat Actors Exploit Google Apps Script to Host Phishing Sites
30
May
2025

Threat Actors Exploit Google Apps Script to Host Phishing Sites

The Cofense Phishing Defense Center has uncovered a highly strategic phishing campaign that leverages Google Apps Script a legitimate development…

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials
30
May
2025

Dadsec Hacker Group Uses Tycoon2FA Infrastructure to Steal Office365 Credentials

Cybersecurity researchers from Trustwave’s Threat Intelligence Team have uncovered a large-scale phishing campaign orchestrated by the notorious hacker group Storm-1575,…

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features
30
May
2025

Pure Crypter Uses Multiple Evasion Methods to Bypass Windows 11 24H2 Security Features

Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for threat actors targeting Windows-based systems…

Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates
30
May
2025

Critical Icinga 2 Vulnerability Allows Attackers to Obtain Valid Certificates

A critical vulnerability (CVE-2025-48057) has been discovered in Icinga 2, the widely used open-source monitoring platform. The flaw, affecting installations…

Dark Partner Hackers Leverage Fake AI, VPN, and Crypto Sites to Target macOS and Windows Users
30
May
2025

Dark Partner Hackers Leverage Fake AI, VPN, and Crypto Sites to Target macOS and Windows Users

A group dubbed “Dark Partners” by cybersecurity researchers has launched a sophisticated malware campaign targeting both macOS and Windows users…

Criminal IP Set to Make Its Debut at Infosecurity Europe 2025
30
May
2025

Criminal IP Set to Make Its Debut at Infosecurity Europe 2025

Criminal IP, the AI-powered threat intelligence platform developed by AI SPERA (led by CEO Byungtak Kang), has announced its first…

Apache InLong JDBC Vulnerability Enables Deserialization of Untrusted Data
30
May
2025

Apache InLong JDBC Vulnerability Enables Deserialization of Untrusted Data

A moderate-severity vulnerability, tracked as CVE-2025-27522, has been disclosed in Apache InLong, a popular data integration platform. The flaw, affecting…

Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks
30
May
2025

Interlock Ransomware Uses NodeSnake RAT for Persistent Access to Corporate Networks

In a two UK-based universities have fallen victim to a sophisticated Remote Access Trojan (RAT) dubbed NodeSnake within the past…

PureHVNC RAT Uses Fake Job Offers and PowerShell to Evade Security Defenses
30
May
2025

PureHVNC RAT Uses Fake Job Offers and PowerShell to Evade Security Defenses

A new and highly evasive malware campaign delivering the PureHVNC Remote Access Trojan (RAT) has been identified by Netskope Threat…

Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack
29
May
2025

Threat Actors Exploit Nifty[.]com Infrastructure in Sophisticated Phishing Attack

Threat actors have orchestrated a multi-wave phishing campaign between April and May 2025, leveraging the legitimate infrastructure of Nifty[.]com, a…

Windows 11 File Explorer Vulnerability Enables NTLM Hash Theft
29
May
2025

Windows 11 File Explorer Vulnerability Enables NTLM Hash Theft

A newly disclosed vulnerability, CVE-2025-24071, has been identified in Windows File Explorer, specifically affecting Windows 11 (23H2) and earlier versions…

New Microsoft Entra Connect Update Replaces Legacy Login Methods
29
May
2025

New Microsoft Entra Connect Update Replaces Legacy Login Methods

Quantum computing is rapidly emerging as one of the most transformative technology trends of 2025, promising to revolutionize industries by…