Category: GBHackers

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks
22
Apr
2025

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have emerged detailing several malicious npm packages that are nefariously exploiting…

Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation
22
Apr
2025

Latest Lumma InfoStealer Variant Found Using Code Flow Obfuscation

Researchers have uncovered a sophisticated new variant of the notorious Lumma InfoStealer malware, employing advanced code flow obfuscation techniques to…

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands
22
Apr
2025

New Rust-Based Botnet Hijacks Routers to Inject Remote Commands

A new malware named “RustoBot” has been discovered exploiting vulnerabilities in various router models to gain unauthorized access and initiate…

Japan Sounds Alarm Over Hackers Draining Millions from Compromised Trading Accounts
22
Apr
2025

Japan Sounds Alarm Over Hackers Draining Millions from Compromised Trading Accounts

Cybersecurity in Japan has hit a new low as the Financial Services Agency (FSA) reports a staggering increase in unauthorized…

CISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops
22
Apr
2025

CISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops

 The Cybersecurity and Infrastructure Security Agency (CISA) has alerted its threat hunting teams to immediately discontinue use of two widely…

Critical Flaw in Windows Update Stack Enables Code Execution and Privilege Escalation
22
Apr
2025

Critical Flaw in Windows Update Stack Enables Code Execution and Privilege Escalation

A newly discovered vulnerability in the Windows Update Stack, tracked as CVE-2025-21204, has sent shockwaves through the cybersecurity community after…

PoC Released for Critical Unauthenticated Erlang/OTP RCE Vulnerability
22
Apr
2025

PoC Released for Critical Unauthenticated Erlang/OTP RCE Vulnerability

A critical remote code execution (RCE) vulnerability in Erlang/OTP’s SSH implementation (CVE-2025-32433) has now entered active exploit risk after researchers…

WordPress Ad-Fraud Plugins Trigger Massive 1.4 Billion Daily Ad Requests
22
Apr
2025

WordPress Ad-Fraud Plugins Trigger Massive 1.4 Billion Daily Ad Requests

Cybersecurity researchers have uncovered a sprawling ad-fraud operation exploiting WordPress plugins to trigger over 1.4 billion fraudulent ad requests every…

MITRE Unveils D3FEND CAD Tool to Model Advanced Cybersecurity Scenarios
22
Apr
2025

MITRE Unveils D3FEND CAD Tool to Model Advanced Cybersecurity Scenarios

MITRE has officially launched D3FEND CAD, an innovative tool designed to revolutionize how organizations model, analyze, and defend against sophisticated…

HPE Performance Cluster Manager Vulnerability Enables Unauthorized Access
22
Apr
2025

HPE Performance Cluster Manager Vulnerability Enables Unauthorized Access

Hewlett Packard Enterprise (HPE) has disclosed a severe security flaw in its Performance Cluster Manager (HPCM) software that could allow…

Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models
22
Apr
2025

Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed “VibeScamming,” where cybercriminals are using AI tools to…

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations
22
Apr
2025

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates…