Category: GBHackers

North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks
20
Mar
2025

North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks

A recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North Korean IT workers to exploit GitHub…

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials
20
Mar
2025

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane, which is distributed through YouTube videos…

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access
20
Mar
2025

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec’s Threat Hunter team has identified a sophisticated custom backdoor named “Betruger” linked to a RansomHub affiliate. This newly discovered…

New Steganographic Malware Hides in JPEG Files to Spread Infostealers
20
Mar
2025

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through seemingly innocuous JPEG image files. This…

IBM Warns of AIX Vulnerabilities Allowing Arbitrary Command Execution
20
Mar
2025

IBM Warns of AIX Vulnerabilities Allowing Arbitrary Command Execution

Free Webinar – Supply Chain Attack Prevention Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers….

Cisco Smart Licensing Utility Vulnerabilities Under Hacker Exploitation
20
Mar
2025

Cisco Smart Licensing Utility Vulnerabilities Under Hacker Exploitation

Recent reports indicate that hackers are actively trying to exploit two critical vulnerabilities in the Cisco Smart Licensing Utility. These…

Massive "DollyWay" Malware Attack Compromises 20,000+ WordPress Sites Worldwide
20
Mar
2025

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

A significant malware operation, dubbed “DollyWay,” has been uncovered by GoDaddy Security researchers, revealing a sophisticated campaign that has compromised…

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics
20
Mar
2025

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged as a significant player in…

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%
20
Mar
2025

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabilities Surge by 130%

Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp…

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches
20
Mar
2025

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is…

Critical Veeam Backup & Replication Vulnerability Allows Remote Execution of Malicious Code
20
Mar
2025

Critical Veeam Backup & Replication Vulnerability Allows Remote Execution of Malicious Code

A critical vulnerability in Veeam Backup & Replication software has been disclosed, posing a significant risk to users. This vulnerability,…

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities
20
Mar
2025

Dell Alerts on Critical Secure Connect Gateway Vulnerabilities

Dell has issued several critical security alerts regarding vulnerabilities in its Secure Connect Gateway (SCG) products. These vulnerabilities pose significant…