Category: GBHackers

Malicious Python Package Impersonates Discord Developers to Deploy Remote Commands
09
May
2025

Malicious Python Package Impersonates Discord Developers to Deploy Remote Commands

A seemingly innocuous Python package named ‘discordpydebug’ surfaced on the Python Package Index (PyPI) under the guise of “Discord py…

Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms
09
May
2025

Scattered Spider Malware Targets Klaviyo, HubSpot, and Pure Storage Platforms

Silent Push researchers have identified that the notorious hacker collective Scattered Spider, also known as UNC3944 or Octo Tempest, continues…

New Mamona Ransomware Targets Windows Systems Using Abused Ping Command
09
May
2025

New Mamona Ransomware Targets Windows Systems Using Abused Ping Command

Cybersecurity researchers are raising the alarm about a newly discovered commodity ransomware strain dubbed Mamona, which is rapidly spreading across Windows…

Chinese Hackers Exploit SAP RCE Vulnerability to Deploy Supershell Backdoors
09
May
2025

Chinese Hackers Exploit SAP RCE Vulnerability to Deploy Supershell Backdoors

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-31324, in SAP NetWeaver Visual Composer 7.x is being actively exploited…

Hackers Target IT Admins by Poisoning SEO to Push Malware to Top Search Results
09
May
2025

Hackers Target IT Admins by Poisoning SEO to Push Malware to Top Search Results

Cybercriminals are increasingly targeting IT administrators through sophisticated Search Engine Optimization (SEO) poisoning techniques. By leveraging SEO tactics typically used…

Hackers Exploit PDF Invoices to Target Windows, Linux, and macOS Systems
09
May
2025

Hackers Exploit PDF Invoices to Target Windows, Linux, and macOS Systems

A recent discovery by the FortiMail Incident Response team has revealed a highly sophisticated email campaign targeting organizations in Spain,…

Kaspersky Alerts on AI-Driven Slopsquatting as Emerging Supply Chain Threat
09
May
2025

Kaspersky Alerts on AI-Driven Slopsquatting as Emerging Supply Chain Threat

Cybersecurity researchers at Kaspersky have identified a new supply chain vulnerability emerging from the widespread adoption of AI-generated code. As…

Apache ActiveMQ Vulnerability Allows Attackers to Induce DoS Condition
09
May
2025

Apache ActiveMQ Vulnerability Allows Attackers to Induce DoS Condition

Critical vulnerability in Apache ActiveMQ (CVE-2024-XXXX) exposes brokers to denial-of-service (DoS) attacks by allowing malicious actors to exhaust system memory…

Hackers Exploit Windows Remote Management to Evade Detection in AD Networks
09
May
2025

Hackers Exploit Windows Remote Management to Evade Detection in AD Networks

A new wave of cyberattacks is targeting Active Directory (AD) environments by abusing Windows Remote Management (WinRM), a legitimate administrative…

Hackers Exploit Host Header Injection to Breach Web Applications
09
May
2025

Hackers Exploit Host Header Injection to Breach Web Applications

Cybersecurity researchers have reported a significant rise in web breaches triggered by a lesser-known technique: Host Header Injection. This sophisticated…

Researchers Uncover Remote Code Execution Flaw in macOS
09
May
2025

Researchers Uncover Remote Code Execution Flaw in macOS

Security researchers Nikolai Skliarenko and Yazhi Wang of Trend Micro’s Research Team have disclosed critical details about CVE-2024-44236, a memory…

Play Ransomware Deployed in the Wild Exploiting Windows 0-Day Vulnerability
09
May
2025

Play Ransomware Deployed in the Wild Exploiting Windows 0-Day Vulnerability

Patched Windows zero-day vulnerability (CVE-2025-29824) in the Common Log File System (CLFS) driver was exploited in attacks linked to the…