Category: GBHackers

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations
23
Apr
2025

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations

Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat actors, identified as UTA0352 and…

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection
23
Apr
2025

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites, with over 80,000 detected in 2024….

Ransomware Actors Ramp Up Attacks organizations with Emerging Extortion Trends
23
Apr
2025

Ransomware Actors Ramp Up Attacks organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with 86% of incidents causing significant business…

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals
23
Apr
2025

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field Communication (NFC) technology to perpetrate large-scale…

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads
23
Apr
2025

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities, are utilizing a malicious traffic…

FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code
23
Apr
2025

FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code

A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been disclosed, enabling attackers to execute unauthorized…

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials
23
Apr
2025

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials

Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building tool, to orchestrate sophisticated phishing and…

Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE - GBHackers Security
23
Apr
2025

Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE – GBHackers Security

Lattica, an FHE-based platform enabling secure and private use of AI in the cloud, has emerged from stealth with $3.25…

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers
23
Apr
2025

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that could allow attackers to silently drain…

New Malware Hijacks Docker Images Using Unique Obfuscation Technique
23
Apr
2025

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services according to Darktrace’s honeypot data, has…

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials
23
Apr
2025

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users with malicious Word documents designed to…

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access
23
Apr
2025

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Researchers have exposed a sophisticated cyberattack technique dubbed the “Cookie-Bite Attack,” which allows adversaries to bypass Multi-Factor Authentication (MFA) and…