Category: GBHackers

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations
25
Apr
2025

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea, heavily utilizing Russian internet infrastructure. Specifically,…

Spring Security Vulnerability Exposes Valid Usernames to Attackers
25
Apr
2025

Spring Security Vulnerability Exposes Valid Usernames to Attackers

A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used Spring Security framework. According to the…

Microsoft's Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw
25
Apr
2025

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a new denial-of-service (DoS) flaw in Windows…

U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers
25
Apr
2025

U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers

With credit card skimming crimes escalating nationwide, the U.S. Secret Service’s Washington Field Office is sharing essential tips for the…

Weaponized SVG Files Used by Threat Actors to Redirect Users to Malicious Sites
25
Apr
2025

Weaponized SVG Files Used by Threat Actors to Redirect Users to Malicious Sites

Cybercriminals are increasingly weaponizing Scalable Vector Graphics (SVG) files to orchestrate sophisticated phishing campaigns. According to research from Intezer, a…

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell
25
Apr
2025

Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell

Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy malicious tools including a web…

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT
24
Apr
2025

New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT

A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the creative and insidious methods attackers employ…

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining
24
Apr
2025

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured Kubernetes clusters to conduct illicit activities…

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities
24
Apr
2025

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group, tracked as “Operation SyncHole,” has compromised…

Small Businesses Identified as Key Targets in Ransomware Attacks
24
Apr
2025

Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business’s 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints a stark picture of the cybersecurity…

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools
24
Apr
2025

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure enterprise fell victim to a meticulously…

NVIDIA NeMo Vulnerability Enables Remote Exploits
24
Apr
2025

NVIDIA NeMo Vulnerability Enables Remote Exploits

NVIDIA has issued an urgent security advisory addressing three high-severity vulnerabilities in its NeMo Framework, a platform widely used for…