Category: GBHackers

Check Point Confirms Data Breach, Says Leaked Information is 'Old'
01
Apr
2025

Check Point Confirms Data Breach, Says Leaked Information is ‘Old’

Cybersecurity giant Check Point has confirmed that a recent post on a notorious dark web forum, BreachForums, attempting to sell…

CrushFTP Security Vulnerability Under Attack After PoC Release
01
Apr
2025

CrushFTP Security Vulnerability Under Attack After PoC Release

A recently disclosed security vulnerability in CrushFTP, identified as CVE-2025-2825, has become the target of active exploitation attempts following the…

Hackers Deploy 24,000 IPs to Breach Palo Alto Networks GlobalProtect
01
Apr
2025

Hackers Deploy 24,000 IPs to Breach Palo Alto Networks GlobalProtect

A wave of malicious activity targeting Palo Alto Networks PAN-OS GlobalProtect portals has been observed, with nearly 24,000 unique IPs…

Linux Lite 7.4 Final Released: Enhanced GUI and Bug Fixes
01
Apr
2025

Linux Lite 7.4 Final Released: Enhanced GUI and Bug Fixes

Linux Lite, a popular lightweight Linux distribution aimed at making Linux accessible to beginners, has officially released its Linux Lite 7.4…

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands
01
Apr
2025

Hewlett Packard RCE Vulnerability Allows Attackers to Bypass Authentication and Execute Remote Commands

A critical unauthenticated remote code execution (RCE) vulnerability in HPE Insight Cluster Management Utility (CMU) v8.2 allows attackers to bypass…

Konni RAT Exploit Windows Explorer limitations To Launches a Multi-Stage Attack & Steal Data
01
Apr
2025

Konni RAT Exploit Windows Explorer limitations To Launches a Multi-Stage Attack & Steal Data

Konni RAT, a highly advanced Remote Access Trojan (RAT), has emerged as a significant cybersecurity threat, leveraging Windows Explorer limitations…

Weaponized Zoom Installer Used by Hackers to Gain RDP Access and Deploy BlackSuit Ransomware
01
Apr
2025

Weaponized Zoom Installer Used by Hackers to Gain RDP Access and Deploy BlackSuit Ransomware

Cybersecurity researchers have uncovered a sophisticated attack campaign where threat actors utilized a trojanized Zoom installer to infiltrate systems, gain…

Threat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution
01
Apr
2025

Threat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution

Security researchers have uncovered a new wave of cyberattacks targeting WordPress websites through the exploitation of the “mu-plugins” (Must-Use plugins)…

Triton RAT Uses Telegram for Remote System Access and Control
01
Apr
2025

Triton RAT Uses Telegram for Remote System Access and Control

Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT, which leverages Telegram for remote…

An Advanced Stealer Malware Sold on Telegram to Target Windows Data
01
Apr
2025

An Advanced Stealer Malware Sold on Telegram to Target Windows Data

DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems since its debut in 2022….

"Lazarus Hackers Group" no longer refer to a single APT group but a collection of many sub-groups
01
Apr
2025

“Lazarus Hackers Group” no longer refer to a single APT group but a collection of many sub-groups

The term “Lazarus Group,” once used to describe a singular Advanced Persistent Threat (APT) actor, has evolved to represent a…

Earth Alux Hackers Use VARGIET Malware to Target Organizations
31
Mar
2025

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth Alux has been uncovered, revealing the…