Category: GBHackers

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access
20
Mar
2025

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec’s Threat Hunter team has identified a sophisticated custom backdoor named “Betruger” linked to a RansomHub affiliate. This newly discovered…

New Steganographic Malware Hides in JPEG Files to Spread Infostealers
20
Mar
2025

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through seemingly innocuous JPEG image files. This…

IBM Warns of AIX Vulnerabilities Allowing Arbitrary Command Execution
20
Mar
2025

IBM Warns of AIX Vulnerabilities Allowing Arbitrary Command Execution

Free Webinar – Supply Chain Attack Prevention Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers….

Cisco Smart Licensing Utility Vulnerabilities Under Hacker Exploitation
20
Mar
2025

Cisco Smart Licensing Utility Vulnerabilities Under Hacker Exploitation

Recent reports indicate that hackers are actively trying to exploit two critical vulnerabilities in the Cisco Smart Licensing Utility. These…

Massive "DollyWay" Malware Attack Compromises 20,000+ WordPress Sites Worldwide
20
Mar
2025

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

A significant malware operation, dubbed “DollyWay,” has been uncovered by GoDaddy Security researchers, revealing a sophisticated campaign that has compromised…

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics
20
Mar
2025

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged as a significant player in…

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%
20
Mar
2025

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp…

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches
20
Mar
2025

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is…

Critical Veeam Backup & Replication Vulnerability Allows Remote Execution of Malicious Code
20
Mar
2025

Critical Veeam Backup & Replication Vulnerability Allows Remote Execution of Malicious Code

A critical vulnerability in Veeam Backup & Replication software has been disclosed, posing a significant risk to users. This vulnerability,…

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities
20
Mar
2025

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities

Dell has issued several critical security alerts regarding vulnerabilities in its Secure Connect Gateway (SCG) products. These vulnerabilities pose significant…

Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees
20
Mar
2025

Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of targeted cyberattacks against employees of the defense-industrial…

Chinese "Salt Typhoon" Hackers Exploit Exchange Vulnerabilities to Target Organizations
20
Mar
2025

Chinese “Salt Typhoon” Hackers Exploit Exchange Vulnerabilities to Target Organizations

The Chinese Advanced Persistent Threat (APT) group known as Salt Typhoon, also referred to as FamousSparrow, GhostEmperor, Earth Estries, and…