Category: GBHackers

Multiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers
03
Apr
2025

Multiple Jenkins Plugin Vulnerabilities Expose Sensitive Information to Attackers

Jenkins, the widely used open-source automation server, faces heightened security risks after researchers disclosed 11 critical vulnerabilities across its core software and…

Hackers Selling SnowDog RAT Malware With Remote Control Capabilities Online
03
Apr
2025

Hackers Selling SnowDog RAT Malware With Remote Control Capabilities Online

A sophisticated remote access trojan (RAT) dubbed SnowDog has surfaced on underground cybercrime forums, prompting alarms among cybersecurity experts. Advertised as a…

Authorities Shut Down Kidflix Child Abuse Platform in Major Takedown
03
Apr
2025

Authorities Shut Down Kidflix Child Abuse Platform in Major Takedown

In one of the most significant operations against child sexual exploitation in recent history, authorities have announced the shutdown of…

Verizon Call Filter App Vulnerability Exposed Call Log Data of Customers
03
Apr
2025

Verizon Call Filter App Vulnerability Exposed Call Log Data of Customers

A vulnerability in Verizon’s Call Filter app for iOS has been discovered, allowing unauthorized access to customer call logs. This…

39M API Keys & Credentials Exposed
03
Apr
2025

39M API Keys & Credentials Exposed

Over 39 million API keys, credentials, and other sensitive secrets were exposed on GitHub in 2024, raising considerable alarm within…

A Powerful New Tool for Analyzing Golang Malware
03
Apr
2025

A Powerful New Tool for Analyzing Golang Malware

Analyzing malware has become increasingly challenging, especially with the growing popularity of programming languages like Golang. Golang, or Go, has…

Cisco Smart Licensing Utility Flaws Allowed Attackers to Gain Admin Access
03
Apr
2025

Cisco Smart Licensing Utility Flaws Allowed Attackers to Gain Admin Access

Cisco has disclosed critical vulnerabilities in its Smart Licensing Utility software, identified as CVE-2024-20439 and CVE-2024-20440, which could allow unauthenticated,…

Over 1,500 PostgreSQL Servers Hit by Fileless Malware Attack
03
Apr
2025

Over 1,500 PostgreSQL Servers Hit by Fileless Malware Attack

A sophisticated malware campaign has compromised over 1,500 PostgreSQL servers, leveraging fileless techniques to deploy cryptomining payloads. The attack, identified…

Hackers Exploit Cloudflare for Advanced Phishing Attacks
02
Apr
2025

Hackers Exploit Cloudflare for Advanced Phishing Attacks

A sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing the abuse of Cloudflare services and…

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers
02
Apr
2025

SmokeLoader Malware Uses Weaponized 7z Archives to Deliver Infostealers

A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB), utilizing a stealthy malware loader, Emmenhtal,…

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware
02
Apr
2025

Hackers Use DeepSeek and Remote Desktop Apps to Deploy TookPS Malware

A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the DeepSeek LLM and popular remote desktop…

Brinker Named Among "10 Most Promising Defense Tech Startups of 2025"
02
Apr
2025

Brinker Named Among “10 Most Promising Defense Tech Startups of 2025”

Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has been recognized as one of the…