Category: GBHackers

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments
12
Apr
2025

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware, signaling its resurgence with attacks…

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain
12
Apr
2025

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what’s known as “Dangling DNS” records to take over corporate subdomains, posing significant threats to organizations’ security…

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware
12
Apr
2025

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the Google Play Store to distribute…

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites
12
Apr
2025

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search engine results, pushing malicious websites…

Tycoon 2FA Phishing Kit Uses Advanced Evasion Techniques to Bypass Endpoint Detection Systems
12
Apr
2025

Tycoon 2FA Phishing Kit Uses Advanced Evasion Techniques to Bypass Endpoint Detection Systems

The notorious Tycoon 2FA phishing kit continues its evolution with new strategies designed to slip past endpoint detection systems. This…

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code
11
Apr
2025

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications, particularly targeting cryptocurrency software. The…

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks
11
Apr
2025

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following a trend noted in Forescout…

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits
11
Apr
2025

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral to everything from consumer electronics to…

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity
11
Apr
2025

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious endeavors. Email bombing, known also…

The Key to Accelerating CMMC 2.0 Compliance
11
Apr
2025

The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity requirements Defense contractors are facing increased…

Sensata Technologies Breached: Ransomware Attack Key Systems
11
Apr
2025

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is currently grappling with the fallout of…

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits
11
Apr
2025

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems (ICS) advisories to address critical vulnerabilities…