Category: GBHackers

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials
18
Mar
2025

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to be from Coinbase. The scam attempts…

DocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide
18
Mar
2025

DocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide

The cybersecurity landscape has witnessed a new threat with the emergence of the DocSwap malware, which disguises itself as a…

Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data
18
Mar
2025

Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data

In a sophisticated phishing campaign uncovered by the BI.ZONE Threat Intelligence team, the Squid Werewolf group, also known as APT37,…

Hackers Use DLL Side-Loading to Deploy Malicious Python Code
18
Mar
2025

Hackers Use DLL Side-Loading to Deploy Malicious Python Code

A recent discovery by Xavier Mertens, a senior handler at the Internet Storm Center, has highlighted a sophisticated attack where…

Details of Sophisticated Multi-Stage Attack Uncovered
18
Mar
2025

Details of Sophisticated Multi-Stage Attack Uncovered

The Bybit hack, which occurred on February 21, 2025, has been extensively analyzed by multiple cybersecurity teams, including Sygnia. This…

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT
18
Mar
2025

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware,…

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds
18
Mar
2025

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds

A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which allows hackers…

Amazon Ends Local Voice Processing, Transitions Fully to Cloud
18
Mar
2025

Amazon Ends Local Voice Processing, Transitions Fully to Cloud

Amazon announced that it will discontinue the local voice processing feature for its AI assistant Alexa. This change, set to…

Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure
18
Mar
2025

Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure

A critical cybersecurity alert has been issued following the active exploitation of a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s…

Quantum-safe clientless Access
18
Mar
2025

Cloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum Attacks

Cloudflare has announced the implementation of post-quantum cryptography across its services. This advancement is part of a broader effort to…

New Burp Suite Extension for Secret Scanning Released
18
Mar
2025

New Burp Suite Extension for Secret Scanning Released

A new extension for Burp Suite has been released, integrating the powerful secret scanning capabilities of TruffleHog. This innovative integration…

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers
18
Mar
2025

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator tool. This decision comes on the…