Category: GBHackers

Single Click on CAPTCHA Triggers Destructive Akira Ransomware Attack on Malicious Website
20
Nov
2025

Single Click on CAPTCHA Triggers Destructive Akira Ransomware Attack on Malicious Website

A sophisticated Akira ransomware attack orchestrated by the Howling Scorpius group recently left a global data storage and infrastructure company…

Hackers Exploit Tuoni C2 Framework to Stealthily Deploy In-Memory Payloads
20
Nov
2025

Hackers Exploit Tuoni C2 Framework to Stealthily Deploy In-Memory Payloads

In October 2025, Morphisec’s anti-ransomware prevention platform detected and neutralized a sophisticated cyberattack targeting a major U.S. real estate company….

Chinese PlushDaemon Hackers Exploit EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers
20
Nov
2025

Chinese PlushDaemon Hackers Exploit EdgeStepper Tool to Hijack Legitimate Updates and Redirect to Malicious Servers

ESET researchers have uncovered a sophisticated attack chain orchestrated by the China-aligned threat actor PlushDaemon, revealing how the group leverages…

CISA Alerts on Fortinet FortiWeb Vulnerability Exploited in Real-World Attacks
20
Nov
2025

CISA Alerts on Fortinet FortiWeb Vulnerability Exploited in Real-World Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical OS command injection vulnerability in…

The Gentlemen" Ransomware Group Deploys Dual-Extortion Tactics, Encrypting and Exfiltrating Data
20
Nov
2025

The Gentlemen” Ransomware Group Deploys Dual-Extortion Tactics, Encrypting and Exfiltrating Data

Cybereason Threat Intelligence Team has uncovered a sophisticated ransomware operation known as “The Gentlemen,” which emerged around July 2025 and…

Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers
20
Nov
2025

Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers

Palo Alto, California, November 19th, 2025, CyberNewsWire SquareX released critical research exposing a hidden API in Comet that allows extensions…

Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications
20
Nov
2025

Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications

Tel Aviv, Israel, November 19th, 2025, CyberNewsWire Seraphic, the leader in enterprise browser security (SEB) and AI enablement, today announced…

Eurofiber Data Breach - Hackers Exploited Vulnerability to Exfiltrate Users' Data
19
Nov
2025

Eurofiber Data Breach – Hackers Exploited Vulnerability to Exfiltrate Users’ Data

Eurofiber France has disclosed a significant cybersecurity incident detected on November 13, 2025, involving a software vulnerability in its ticket…

Microsoft Adds New Threat Briefing Agent Inside Defender Portal
19
Nov
2025

Microsoft Adds New Threat Briefing Agent Inside Defender Portal

Microsoft announced significant enhancements to its threat intelligence capabilities at Ignite 2025, including the full integration of the Threat Intelligence…

Cloudflare Reveals Full Technical Explanation of Major Internet Outage
19
Nov
2025

Cloudflare Reveals Full Technical Explanation of Major Internet Outage

Cloudflare has released a comprehensive post-mortem analysis of a significant network outage that disrupted internet services globally on November 18,…

New Phishing Kit Using BitB Technique Targets Microsoft Accounts to Steal Credentials via Sneaky 2FA Attack
19
Nov
2025

New Phishing Kit Using BitB Technique Targets Microsoft Accounts to Steal Credentials via Sneaky 2FA Attack

The cybersecurity landscape continues to evolve as threat actors deploy increasingly sophisticated phishing techniques to bypass security controls and steal…

New .NET Malware Conceals Lokibot Inside PNG/BMP Files to Bypass Detection
19
Nov
2025

New .NET Malware Conceals Lokibot Inside PNG/BMP Files to Bypass Detection

Remote Access Trojans (RATs) and Trojan Stealers continue to dominate the threat landscape as some of the most prevalent malware…