Category: GBHackers

Multiple Dell Unity Vulnerabilities Allow Attackers to Compromise Systems
31
Mar
2025

Multiple Dell Unity Vulnerabilities Allow Attackers to Compromise Systems

Dell Technologies has released a security advisory detailing multiple critical vulnerabilities in its Dell Unity storage systems and related software….

U.S. DOJ Seizes $8.2 Million from Hackers Linked to Pig Butchering Scam
31
Mar
2025

U.S. DOJ Seizes $8.2 Million from Hackers Linked to Pig Butchering Scam

The U.S. Department of Justice has successfully seized over $8.2 million in cryptocurrency tied to an elaborate “pig butchering” fraud…

"Crocodilus" A New Malware Targeting Android Devices for Full Takeover
29
Mar
2025

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial institutions and cryptocurrency platforms. The malware…

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos backdoor
29
Mar
2025

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group, targeting Ukrainian users with malicious LNK…

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk
29
Mar
2025

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging cyberthreats to plague enterprises. Chainalysis estimates…

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel
28
Mar
2025

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in a new campaign targeting users in…

New Python-Based Discord RAT Targets Users to Steal Login Credentials
28
Mar
2025

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community due to its innovative use of…

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands
28
Mar
2025

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS mail exchange (MX) records to…

GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries
28
Mar
2025

GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries

A critical SQL injection vulnerability, tracked as CVE-2025-24799, has been identified in GLPI, a widely used open-source IT Service Management (ITSM) tool….

A Framework for Detecting Backdoor Attacks in Deep Learning Models
28
Mar
2025

A Framework for Detecting Backdoor Attacks in Deep Learning Models

Deep learning models, increasingly integral to safety-critical systems like self-driving cars and medical devices, are vulnerable to stealthy backdoor attacks….

SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server
28
Mar
2025

SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server

Elastic Security Labs has uncovered a sophisticated malware campaign, dubbed REF8685, targeting the Iraqi telecommunications sector. The campaign utilizes a…

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data
28
Mar
2025

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

In a complex cyber operation discovered by Silent Push Threat Analysts, Russian hackers have launched a multi-pronged phishing campaign impersonating…