Category: GBHackers

APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign
16
May
2025

APT Group 123 Targets Windows Systems in Ongoing Malicious Payload Campaign

Group123, a North Korean state-sponsored Advanced Persistent Threat (APT) group also known by aliases such as APT37, Reaper, and ScarCruft,…

Frigidstealer Malware Targets macOS Users to Harvest Login Credentials
16
May
2025

Frigidstealer Malware Targets macOS Users to Harvest Login Credentials

An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable threat since January 2025. This insidious…

FBI Alerts Public to Malicious Campaign Impersonating US Government Officials
16
May
2025

FBI Alerts Public to Malicious Campaign Impersonating US Government Officials

Federal Bureau of Investigation has issued a warning about an ongoing malicious messaging campaign targeting current and former senior US…

Jenkins Released Security Updates – Multiple Vulnerabilities Fixed That Allow Attackers to Exploit CI/CD Pipelines
16
May
2025

Jenkins Released Security Updates – Multiple Vulnerabilities Fixed That Allow Attackers to Exploit CI/CD Pipelines

Jenkins, the widely used automation server for CI/CD pipelines, has released a critical security advisory addressing several vulnerabilities in popular…

SonicWall SMA1000 Vulnerability Allow Attackers to Exploit Encoded URLs To Remotely Gain Internal Systems Access
16
May
2025

SonicWall SMA1000 Vulnerability Allow Attackers to Exploit Encoded URLs To Remotely Gain Internal Systems Access

SonicWall has issued a critical security advisory (SNWLID-2025-0010) for its SMA1000 Appliance Work Place interface, revealing a high-severity Server-Side Request…

Pwn2Own Day 1 - Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked
16
May
2025

Pwn2Own Day 1 – Windows 11, Red Hat Linux, & Oracle VirtualBox Hacked

Security researchers successfully illustrated significant vulnerabilities across several platforms on the first day of Pwn2Own Berlin 2025, taking home a…

Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses
16
May
2025

Hackers Leveraging PowerShell to Bypass Antivirus and EDR Defenses

Cybersecurity researchers have uncovered a growing trend in which threat actors are exploiting Microsoft PowerShell a legitimate Windows command-line interface…

Tor Oniux Tool Offers Anonymous Linux App Traffic
16
May
2025

Tor Oniux Tool Offers Anonymous Linux App Traffic

Tor Project has unveiled oniux, a new command-line utility that provides comprehensive network isolation for Linux applications, ensuring all traffic…

Proofpoint Buys Hornetsecurity, A Microsoft 365 Security Specialist For $1 Billion
16
May
2025

Proofpoint Buys Hornetsecurity, A Microsoft 365 Security Specialist For $1 Billion

Cybersecurity giant Proofpoint has announced its agreement to acquire Hornetsecurity Group, a leading European provider of AI-powered Microsoft 365 security…

CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products
15
May
2025

CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding five zero-day vulnerabilities affecting multiple Fortinet…

Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors
15
May
2025

Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors

Major victory against online crime, two of the world’s largest illicit marketplaces-Huione Guarantee (also known as “Haowang Guarantee”) and Xinbi…

Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks
15
May
2025

Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks

The Socket Threat Research Team has uncovered a surge in supply chain attacks where threat actors weaponize open source software…