Category: GBHackers

Konni RAT Exploit Windows Explorer limitations To Launches a Multi-Stage Attack & Steal Data
01
Apr
2025

Konni RAT Exploit Windows Explorer limitations To Launches a Multi-Stage Attack & Steal Data

Konni RAT, a highly advanced Remote Access Trojan (RAT), has emerged as a significant cybersecurity threat, leveraging Windows Explorer limitations…

Weaponized Zoom Installer Used by Hackers to Gain RDP Access and Deploy BlackSuit Ransomware
01
Apr
2025

Weaponized Zoom Installer Used by Hackers to Gain RDP Access and Deploy BlackSuit Ransomware

Cybersecurity researchers have uncovered a sophisticated attack campaign where threat actors utilized a trojanized Zoom installer to infiltrate systems, gain…

Threat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution
01
Apr
2025

Threat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution

Security researchers have uncovered a new wave of cyberattacks targeting WordPress websites through the exploitation of the “mu-plugins” (Must-Use plugins)…

Triton RAT Uses Telegram for Remote System Access and Control
01
Apr
2025

Triton RAT Uses Telegram for Remote System Access and Control

Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT, which leverages Telegram for remote…

An Advanced Stealer Malware Sold on Telegram to Target Windows Data
01
Apr
2025

An Advanced Stealer Malware Sold on Telegram to Target Windows Data

DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems since its debut in 2022….

"Lazarus Hackers Group" no longer refer to a single APT group but a collection of many sub-groups
01
Apr
2025

“Lazarus Hackers Group” no longer refer to a single APT group but a collection of many sub-groups

The term “Lazarus Group,” once used to describe a singular Advanced Persistent Threat (APT) actor, has evolved to represent a…

Earth Alux Hackers Use VARGIET Malware to Target Organizations
31
Mar
2025

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth Alux has been uncovered, revealing the…

Operation HollowQuill - Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks
31
Mar
2025

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation HollowQuill, has been uncovered. The operation…

Russian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure
31
Mar
2025

Russian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure

Russian-aligned cyber threat groups, UAC-0050 and UAC-0006, have significantly escalated their operations in 2025, targeting entities worldwide with a focus…

Chinese Lotus Blossom Hackers leverages Windows Management Instrumentation for Network Movement
31
Mar
2025

Chinese Lotus Blossom Hackers leverages Windows Management Instrumentation for Network Movement

The Chinese Advanced Persistent Threat (APT) group known as Lotus Blossom, also referred to as Billbug, Thrip, or Spring Dragon,…

Mitel Alerts Users to Severe XSS Vulnerability in MiContact Center
31
Mar
2025

Mitel Alerts Users to Severe XSS Vulnerability in MiContact Center

Mitel has issued a security advisory (MISA-2025-0003) to notify users of its MiContact Center Business software about a high-severity reflected…

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code
31
Mar
2025

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially allowing attackers to execute arbitrary code….