Category: GBHackers

CISA and FBI Issue Alert as Ghost Ransomware Targets 70+ Organizations
20
Feb
2025

CISA and FBI Issue Alert as Ghost Ransomware Targets 70+ Organizations

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a joint advisory warning…

Windows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation
20
Feb
2025

Windows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation

Microsoft has urgently addressed a high-severity privilege escalation vulnerability (CVE-2025-21420) in the Windows Disk Cleanup Utility (cleanmgr.exe) during its February…

Citrix NetScaler Vulnerability Exposes Systems to Unauthorized Commands
20
Feb
2025

Citrix NetScaler Vulnerability Exposes Systems to Unauthorized Commands

Cloud Software Group has raced to address a severe security flaw in its widely used NetScaler management infrastructure that could…

Malware-Infected Signal, Line, and Gmail Apps Alter System Defenses
20
Feb
2025

Malware-Infected Signal, Line, and Gmail Apps Alter System Defenses

A recent cybersecurity analysis has uncovered a campaign targeting Chinese-speaking users through malicious installers of popular applications such as Signal,…

Next Wave of 'Scam-Yourself' Attacks Leverages AI-Generated Deepfake Videos
20
Feb
2025

Next Wave of ‘Scam-Yourself’ Attacks Leverages AI-Generated Deepfake Videos

Cybersecurity experts have uncovered a new wave of “Scam-Yourself” attacks that exploit AI-generated deepfake videos and malicious scripts to deceive…

Threat Actors Using $10 Infostealer Malware to Compromise US Security
19
Feb
2025

Threat Actors Using $10 Infostealer Malware to Compromise US Security

A recent cybersecurity investigation has unveiled a troubling reality: U.S. military personnel and employees of major defense contractors, including Lockheed…

BlackLock Ransomware Targets Windows, VMware ESXi, & Linux Environments
19
Feb
2025

BlackLock Ransomware Targets Windows, VMware ESXi, & Linux Environments

BlackLock ransomware, first identified in March 2024, has rapidly ascended the ranks of the ransomware-as-a-service (RaaS) ecosystem, becoming the seventh…

North Korean Hackers Leverage Dropbox and PowerShell Scripts to Breacg Orgs
19
Feb
2025

North Korean Hackers Leverage Dropbox and PowerShell Scripts to Breacg Orgs

A recent cyberattack campaign, dubbed “DEEP#DRIVE,” has been attributed to the North Korean Advanced Persistent Threat (APT) group, Kimsuky. The…

Russian CryptoBytes Hackers Target Windows Machines with UxCryptor Ransomware
19
Feb
2025

Russian CryptoBytes Hackers Target Windows Machines with UxCryptor Ransomware

The SonicWall Capture Labs threat research team has identified continued activity from the Russian cybercriminal group CryptoBytes, which has been…

Snake Keylogger Targets Chrome, Edge, and Firefox Users in New Attack Campaign
19
Feb
2025

Snake Keylogger Targets Chrome, Edge, and Firefox Users in New Attack Campaign

A new variant of the Snake Keylogger, also known as 404 Keylogger, has been detected targeting users of popular web…

Hackers Converting Stolen Payment Card Data into Apple & Google Wallets
19
Feb
2025

Hackers Converting Stolen Payment Card Data into Apple & Google Wallets

Cybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card…

Hackers Exploit Jarsigner Tool to Deploy XLoader Malware
19
Feb
2025

Hackers Exploit Jarsigner Tool to Deploy XLoader Malware

Security researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a new campaign leveraging the legitimate JAR signing tool, jarsigner.exe,…