Category: GBHackers

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows
27
Feb
2025

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has been patched after researchers discovered it…

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS
27
Feb
2025

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000 Series Switches operating in standalone NX-OS…

Windows Virtualization-Based Security Exploited to Develop Highly Evasive Malware
27
Feb
2025

Windows Virtualization-Based Security Exploited to Develop Highly Evasive Malware

In a groundbreaking development, researchers have uncovered how attackers are exploiting Windows Virtualization-Based Security (VBS) enclaves to create malware that…

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections
27
Feb
2025

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections

A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting trojan, is leveraging PKG files with…

App with Over 100,000 Downloads from Google Play Steals User Data and Blackmails
27
Feb
2025

App with Over 100,000 Downloads from Google Play Steals User Data and Blackmails

A financial management app named Finance Simplified has been revealed as a malicious tool for stealing sensitive user data and…

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications
27
Feb
2025

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection during malware distribution. Attackers are…

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File
27
Feb
2025

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has been detected, targeting government and…

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data
27
Feb
2025

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox, has been uncovered, targeting healthcare…

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager
26
Feb
2025

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial appearance in November 2024. Known…

Threat Actors Exploit DeepSeek Craze to Distribute Vidar Stealer Malware
26
Feb
2025

Threat Actors Exploit DeepSeek Craze to Distribute Vidar Stealer Malware

In a concerning new development, cybercriminals are exploiting the widespread popularity of the recently launched DeepSeek AI chatbot to distribute…

Ransomware Group Data-Leak Sites Increasing as Six New Groups Emerge
26
Feb
2025

Ransomware Group Data-Leak Sites Increasing as Six New Groups Emerge

The cybersecurity landscape has witnessed a significant uptick in ransomware activity, with six new data-leak sites (DLSs) linked to emerging…

Researchers Uncover $1.4B in Sensitive Data Tied to ByBit Hack by Lazarus Group
26
Feb
2025

Researchers Uncover $1.4B in Sensitive Data Tied to ByBit Hack by Lazarus Group

In a significant breakthrough, cybersecurity firm Silent Push has uncovered sensitive infrastructure tied to the Lazarus Group, a North Korean…