Category: GBHackers

MassJacker Clipper Malware Targets Users Installing Pirated Software
17
Mar
2025

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets users who download pirated software from…

Beware! Malware Hidden in Free Word-to-PDF Converters
17
Mar
2025

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion tools, which are being used to…

Supply Chain Attack Targets 23,000 GitHub Repositories
17
Mar
2025

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is used in over 23,000 repositories….

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks
17
Mar
2025

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction among cybercriminals and nation-state-sponsored groups….

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials
17
Mar
2025

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials

The HELLCAT ransomware group has claimed responsibility for a significant data breach at Jaguar Land Rover (JLR), exposing vast amounts…

Apple Introduces RCS End-to-End Encryption for iPhone Messages
17
Mar
2025

Apple Introduces RCS End-to-End Encryption for iPhone Messages

Apple has announced the integration of end-to-end encryption (E2EE) for Rich Communication Services (RCS) on iPhones. This development follows the…

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers
17
Mar
2025

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers

A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache Tomcat, identified as CVE-2025-24813. This vulnerability…

Hackers Use CSS Tricks to Bypass Spam Filters and Monitor Users
17
Mar
2025

Hackers Use CSS Tricks to Bypass Spam Filters and Monitor Users

Cybersecurity experts have uncovered how hackers use Cascading Style Sheets (CSS) to deceive spam filters and monitor user behavior. This…

Adobe Acrobat Vulnerabilities Enable Remote Code Execution
17
Mar
2025

Adobe Acrobat Vulnerabilities Enable Remote Code Execution

A recent disclosure by Cisco Talos’ Vulnerability Discovery & Research team highlighted several vulnerability issues in Adobe Acrobat. All of…

Hackers Target TP-Link Vulnerability to Gain Full System Control
17
Mar
2025

Hackers Target TP-Link Vulnerability to Gain Full System Control

Hackers exploit a vulnerability in TP-Link routers, specifically the TL-WR845N model, to gain full control over the system. This exploit…

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers
14
Mar
2025

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting both Windows and Linux systems. The…

AWS SNS Exploited for Data Exfiltration and Phishing Attacks
14
Mar
2025

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services’ Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service that facilitates communication between applications and…