Category: GBHackers

Space Pirates Hackers Attacking IT organizations With LuckyStrike Using OneDrive
03
Mar
2025

Space Pirates Hackers Attacking IT organizations With LuckyStrike Using OneDrive

A recent investigation by cybersecurity experts has unveiled a series of advanced cyberattacks orchestrated by the notorious Advanced Persistent Threat…

Paragon Partition Manager Vulnerabilities Allow Attackers to Escalate Privileges and Trigger DoS Attacks
03
Mar
2025

Paragon Partition Manager Vulnerabilities Allow Attackers to Escalate Privileges and Trigger DoS Attacks

Security researchers have uncovered five significant vulnerabilities in Paragon Partition Manager’s BioNTdrv.sys driver, affecting versions prior to 2.0.0. These flaws,…

North Korean IT Workers Hide Their IPs Using Astrill VPN
03
Mar
2025

North Korean IT Workers Hide Their IPs Using Astrill VPN

Security researchers have uncovered new evidence that North Korean threat actors, particularly the Lazarus Group, are actively using Astrill VPN…

Njrat Exploits Microsoft Dev Tunnels for C2 Communication
03
Mar
2025

Njrat Exploits Microsoft Dev Tunnels for C2 Communication

A new campaign involving the notorious remote access trojan (RAT) Njrat has been uncovered, leveraging Microsoft’s Dev Tunnels service for…

Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data
03
Mar
2025

Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data

Cybersecurity researchers have uncovered a sophisticated phishing campaign leveraging Google Ads and PayPal’s infrastructure to deceive users and steal sensitive…

U.S. Suspends Cyberattacks Against Russia
03
Mar
2025

U.S. Suspends Cyberattacks Against Russia

The United States has suspended offensive cyber operations against Russia under an order issued by Defense Secretary Pete Hegseth, according…

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data
03
Mar
2025

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed “Poco RAT,” has emerged as a potent espionage tool in a campaign targeting Spanish-speaking…

Google Launches Shielded Email to Keep Your Address Hidden from Apps
03
Mar
2025

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and services from accessing users’ primary…

Exploiting Amazon IAM Permissions for Phishing Attacks
03
Mar
2025

Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in Amazon Web Services (AWS) environments…

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware
03
Mar
2025

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell and legitimate Microsoft applications to…

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities - GBHackers Security
02
Mar
2025

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities – GBHackers Security

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking vulnerability in modern dashcam technology, exposing…

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations
28
Feb
2025

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved into a sophisticated tool for cyber…