Category: GBHackers

Hackers Use Weaponized RAR Archives to Deliver Pure Malware in Targeted Attacks
20
May
2025

Hackers Use Weaponized RAR Archives to Deliver Pure Malware in Targeted Attacks

Russian organizations have become prime targets of a sophisticated malware campaign deploying the Pure malware family, first identified in mid-2022….

Regeneron to Buy 23andMe for $256M Amid Growing Data Privacy Concerns
20
May
2025

Regeneron to Buy 23andMe for $256M Amid Growing Data Privacy Concerns

Biotechnology giant Regeneron Pharmaceuticals has emerged as the successful bidder in the bankruptcy auction for genetic testing pioneer 23andMe, offering…

RedisRaider Campaign Targets Linux Servers by Exploiting Misconfigured Redis Instances
20
May
2025

RedisRaider Campaign Targets Linux Servers by Exploiting Misconfigured Redis Instances

Datadog Security Research has uncovered a formidable new cryptojacking campaign dubbed “RedisRaider,” specifically targeting Linux servers with publicly accessible Redis…

Kimsuky APT Group Deploys PowerShell Payloads to Deliver XWorm RAT
20
May
2025

Kimsuky APT Group Deploys PowerShell Payloads to Deliver XWorm RAT

Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by the notorious Kimsuky Advanced Persistent Threat (APT) group, deploying intricately…

Accenture Files Leak - New Research Reveals Projects Controlling Billions of User Data
20
May
2025

Accenture Files Leak – New Research Reveals Projects Controlling Billions of User Data

A new research report released today by Progressive International, Expose Accenture, and the Movement Research Unit uncovers the sprawling influence…

More_Eggs Malware Uses Job Application Emails to Distribute Malicious Payloads
20
May
2025

More_Eggs Malware Uses Job Application Emails to Distribute Malicious Payloads

The More_Eggs malware, operated by the financially motivated Venom Spider group (also known as Golden Chickens), continues to exploit human…

Hackers Abuse TikTok and Instagram APIs to Verify Stolen Account Credentials
20
May
2025

Hackers Abuse TikTok and Instagram APIs to Verify Stolen Account Credentials

Cybercriminals are leveraging the Python Package Index (PyPI) to distribute malicious tools designed to exploit TikTok and Instagram APIs for…

CISA Includes MDaemon Email Server XSS Flaw in KEV Catalog
20
May
2025

CISA Includes MDaemon Email Server XSS Flaw in KEV Catalog

Cybersecurity and Infrastructure Security Agency (CISA) has added a cross-site scripting (XSS) vulnerability affecting MDaemon Email Server to its Known…

Cyberattack on Serviceaide Compromises Data of 480,000 Catholic Health Patients
20
May
2025

Cyberattack on Serviceaide Compromises Data of 480,000 Catholic Health Patients

Data breach at Serviceaide, Inc., a technology vendor for Catholic Health, exposed sensitive information belonging to approximately 480,000 patients. The…

Qilin Exploits SAP Zero-Day Vulnerability Weeks Ahead of Public Disclosure
20
May
2025

Qilin Exploits SAP Zero-Day Vulnerability Weeks Ahead of Public Disclosure

Cybersecurity experts at OP Innovate have uncovered evidence that CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver Visual Composer, was…

WordPress Plugin Flaw Puts 22,000 Websites at Risk of Cyber Attacks
20
May
2025

WordPress Plugin Flaw Puts 22,000 Websites at Risk of Cyber Attacks

A severe security flaw has been uncovered in the Motors WordPress theme, a popular choice for car dealerships and listings…

Critical Multer Vulnerability Puts Millions of Node.js Apps at Risk
20
May
2025

Critical Multer Vulnerability Puts Millions of Node.js Apps at Risk

Critical security vulnerability has been discovered in Multer, one of the most widely used Node.js middleware packages for handling file…