Category: GBHackers

New Apache Traffic Server Flaws Allow Malformed Request Exploits
10
Mar
2025

New Apache Traffic Server Flaws Allow Malformed Request Exploits

The Apache Software Foundation has disclosed several vulnerabilities affecting its Traffic Server software. These vulnerabilities allow malicious actors to exploit…

Over 43 Million Python Installations Vulnerable to Dangerous Code Execution Flaw
10
Mar
2025

Over 43 Million Python Installations Vulnerable to Dangerous Code Execution Flaw

A significant vulnerability has been uncovered in the Python JSON Logger package (python-json-logger), affecting versions 3.2.0 and 3.2.1. This flaw,…

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack
08
Mar
2025

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated “Click Fix” style distribution campaigns that deliver the notorious Lumma Stealer malware to unsuspecting…

1 Million Devices Infected by Malware from GitHub
08
Mar
2025

1 Million Devices Infected by Malware from GitHub

In a recent alert, Microsoft revealed a large-scale malvertising campaign that has compromised nearly one million devices worldwide. This campaign,…

North Korean Uses Moonstone Sleet Creative Tactics to Deploy Custom Ransomware
08
Mar
2025

North Korean Uses Moonstone Sleet Creative Tactics to Deploy Custom Ransomware

In a recent development, Microsoft has identified a new North Korean threat actor known as Moonstone Sleet, which has been…

Threat Actors Exploit PHP-CGI RCE Vulnerability to Attack Windows Machines
07
Mar
2025

Threat Actors Exploit PHP-CGI RCE Vulnerability to Attack Windows Machines

A recent cybersecurity threat has emerged where unknown attackers are exploiting a critical remote code execution (RCE) vulnerability in PHP-CGI…

New PyPI Malware Targets Developers to Steal Ethereum Wallets
07
Mar
2025

New PyPI Malware Targets Developers to Steal Ethereum Wallets

A recent discovery by the Socket Research Team has unveiled a malicious PyPI package named set-utils, designed to steal Ethereum…

Strela Stealer Malware Targets Microsoft Outlook Users for Credential Theft
07
Mar
2025

Strela Stealer Malware Targets Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer malware, a sophisticated infostealer designed to…

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms
07
Mar
2025

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical letters claiming to be from the…

Akira Ransomware Targets Windows Servers via RDP and Evades EDR with Webcam Trick
07
Mar
2025

Akira Ransomware Targets Windows Servers via RDP and Evades EDR with Webcam Trick

In a recent cybersecurity incident, the Akira ransomware group demonstrated its evolving tactics by exploiting an unsecured webcam to bypass…

Fake Tax Claims Scam Stealing Over $10,000 from Victims
07
Mar
2025

Fake Tax Claims Scam Stealing Over $10,000 from Victims

Tax season has become a breeding ground for sophisticated AI-powered scams, with nearly half of Americans reporting fraudulent IRS-related communications,…

Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks
07
Mar
2025

Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks

A recent security analysis of Draytek Vigor routers has uncovered severe vulnerabilities that could allow attackers to hijack devices, execute…