Category: GBHackers

Lucid PhAAS Platform Uses RCS and iMessage to Evade Detection
27
Mar
2025

Lucid PhAAS Platform Uses RCS and iMessage to Evade Detection

The cybersecurity landscape has been disrupted by the emergence of Lucid, a sophisticated Phishing-as-a-Service (PhAAS) platform developed by Chinese-speaking threat…

Malicious Google Ads Target DeepSeek Users to Spread Malware
27
Mar
2025

Malicious Google Ads Target DeepSeek Users to Spread Malware

Cybersecurity threats continue to evolve, with malicious actors exploiting popular platforms like Google Ads to spread malware. Recently, a sophisticated…

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience
24
Mar
2025

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience

Paris, France, March 24th, 2025, CyberNewsWire Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full…

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems
24
Mar
2025

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime ecosystem. Introduced on March 7, 2025,…

FCC Investigates Chinese Entities on US Government’s Prohibited List
24
Mar
2025

FCC Investigates Chinese Entities on US Government’s Prohibited List

The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously identified as national security risks to…

Dual-Stack Solution to Defend Against Memory Corruption Attacks
24
Mar
2025

Dual-Stack Solution to Defend Against Memory Corruption Attacks

CleanStack is a novel stack protection mechanism designed to combat memory corruption attacks, which have long been a significant threat…

Authorities Arrest 300+ Linked to Cyber Attacks
24
Mar
2025

Authorities Arrest 300+ Linked to Cyber Attacks

An INTERPOL-led operation, dubbed “Operation Red Card,” has resulted in the arrest of over 306 individuals suspected of involvement in…

Chinese 'Web Shell Whisperer' Leverages Shells and Tunnels to Establish Stealthy Persistence
24
Mar
2025

Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence

A recent cyber espionage operation by a China-nexus threat actor, dubbed “Weaver Ant,” has been uncovered by Sygnia, a cybersecurity…

WordPress Plugin Vulnerability Opens Door to SQL Injection Exploits
24
Mar
2025

WordPress Plugin Vulnerability Opens Door to SQL Injection Exploits

A critical vulnerability in the popular WordPress plugin GamiPress has been uncovered, leaving users exposed to unauthenticated SQL injection attacks….

Critical Chrome Vulnerability Allows Attackers to Execute Arbitrary Code
24
Mar
2025

Critical Chrome Vulnerability Allows Attackers to Execute Arbitrary Code

Google has recently rolled out a critical security update for its Chrome browser, addressing vulnerabilities that could potentially allow attackers…

SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications
24
Mar
2025

SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications

A new strain of malware, known as SvcStealer, has emerged as a significant threat in the cybersecurity landscape. This malware…

North Korea Launches Military Research Facility to Strengthen Cyber Warfare Operations
24
Mar
2025

North Korea Launches Military Research Facility to Strengthen Cyber Warfare Operations

North Korea has taken a significant step in enhancing its cyber warfare capabilities by establishing a new research center, known…