Category: GBHackers

New “Spiderman” Phishing Kit Lets Hackers Build Fake Bank Login Pages Instantly
11
Dec
2025

New “Spiderman” Phishing Kit Lets Hackers Build Fake Bank Login Pages Instantly

A sophisticated phishing toolkit dubbed “Spiderman” has emerged as a significant threat to European banking customers, enabling cybercriminals to create…

19 Fake PNG Extensions Found in VS Code Marketplace
11
Dec
2025

19 Fake PNG Extensions Found in VS Code Marketplace

ReversingLabs (RL) researchers have identified a sophisticated supply chain campaign involving 19 malicious Visual Studio Code (VS Code) extensions. The…

PeerBlight Linux Malware Abuses React2Shell for Proxy Tunneling
10
Dec
2025

PeerBlight Linux Malware Abuses React2Shell for Proxy Tunneling

Cybersecurity researchers have uncovered a sophisticated Linux malware campaign exploiting the critical React2Shell vulnerability (CVE-2025-55182) to deploy multiple post-exploitation payloads….

FortiGuard Team Uncovers Stealth Forensic Data Within Windows Telemetry
10
Dec
2025

FortiGuard Team Uncovers Stealth Forensic Data Within Windows Telemetry

During a recent incident response engagement, FortiGuard IR services responded to a sophisticated ransomware attack in which threat actors deployed…

Windows Defender Firewall Flaw Allows Attackers to Access Sensitive Data
10
Dec
2025

Windows Defender Firewall Flaw Allows Attackers to Access Sensitive Data

Microsoft has officially addressed a new security vulnerability affecting the Windows Defender Firewall Service that could allow threat actors to…

Microsoft Releases New Guidance to Combat the Shai-Hulud 2.0 Supply Chain Threat
10
Dec
2025

Microsoft Releases New Guidance to Combat the Shai-Hulud 2.0 Supply Chain Threat

Microsoft has published comprehensive guidance addressing the Shai-Hulud 2.0 supply chain attack, one of the most significant cloud-native ecosystem compromises…

Gemini Zero-Click Flaw Let Attackers Access Gmail, Calendar, and Google Docs
10
Dec
2025

Gemini Zero-Click Flaw Let Attackers Access Gmail, Calendar, and Google Docs

A critical vulnerability in Google Gemini Enterprise and Vertex AI Search, dubbed GeminiJack, that allows attackers to exfiltrate sensitive corporate data…

Threat Actors Exploit ChatGPT and Grok Conversations to Deliver AMOS Stealer
10
Dec
2025

Threat Actors Exploit ChatGPT and Grok Conversations to Deliver AMOS Stealer

The cybersecurity landscape has reached a troubling inflection point. On December 5, 2025, Huntress identified a sophisticated campaign deploying the…

Parrot 7.0 Beta Introduces Debian 13 and a Fully Redesigned Desktop
10
Dec
2025

Parrot 7.0 Beta Introduces Debian 13 and a Fully Redesigned Desktop

Parrot Security OS has unveiled its highly anticipated 7.0 beta release, marking a significant milestone with the integration of Debian…

Cybercriminals Use Fake Game Updates on Itch.io and Patreon to Push Lumma Stealer
10
Dec
2025

Cybercriminals Use Fake Game Updates on Itch.io and Patreon to Push Lumma Stealer

The indie gaming community faces a new and sophisticated threat. Malicious actors are exploiting itch.io and Patreon to distribute the…

AI-Powered Analysis Exposes Massive 5,000-Domain Chinese Malware Operation
10
Dec
2025

AI-Powered Analysis Exposes Massive 5,000-Domain Chinese Malware Operation

DomainTools Investigations has released critical findings detailing the expansion of a massive malware-delivery network targeting Chinese-speaking users worldwide. The long-running…

High-Risk Ivanti EPM Vulnerability Opens Door to Admin Session Hijacking
10
Dec
2025

High-Risk Ivanti EPM Vulnerability Opens Door to Admin Session Hijacking

A critical stored cross-site scripting (XSS) vulnerability in Ivanti Endpoint Manager (EPM) enables unauthenticated attackers to hijack administrator sessions by…