Category: GBHackers

Spotify Music Library Targeted as Hacktivists Scrape 86 Million Files
23
Dec
2025

Spotify Music Library Targeted as Hacktivists Scrape 86 Million Files

Anna’s Archive, a prominent digital preservation platform, has announced the largest unauthorized extraction of Spotify music data ever recorded. The…

MacSync Stealer Malware Targets macOS Users Through Digitally Signed Apps
23
Dec
2025

MacSync Stealer Malware Targets macOS Users Through Digitally Signed Apps

Jamf Threat Labs has uncovered a new MacSync Stealer campaign that significantly raises the bar for macOS malware delivery by…

Threat Actors Impersonate Korean TV Writers to Deliver Malware
23
Dec
2025

Threat Actors Impersonate Korean TV Writers to Deliver Malware

North Korean-backed threat actors are impersonating writers from major Korean broadcasting companies to deliver malicious documents and establish initial access…

Critical n8n Vulnerability Exposes 103,000+ Automation Instances to RCE Attacks
23
Dec
2025

Critical n8n Vulnerability Exposes 103,000+ Automation Instances to RCE Attacks

A critical remote code execution vulnerability in n8n, a popular open-source workflow automation platform, threatens over 103,000 potentially vulnerable instances…

Indian Income Tax–Lure Campaign Deploying Multi-Stage Malware Against Businesses
23
Dec
2025

Indian Income Tax–Lure Campaign Deploying Multi-Stage Malware Against Businesses

Tax-themed phishing campaigns have intensified in recent months, capitalizing on the heightened awareness surrounding India’s Income Tax Return (ITR) filing…

Wonderland Android Malware Targets OTPs Through Two-Way SMS Hijacking
22
Dec
2025

Wonderland Android Malware Targets OTPs Through Two-Way SMS Hijacking

Group-IB security researchers have uncovered a sophisticated new Android malware family dubbed “Wonderland” that represents a significant evolution in SMS-stealing…

New Darknet AI Platform Enhancing Capabilities of Cybercriminals
22
Dec
2025

New Darknet AI Platform Enhancing Capabilities of Cybercriminals

Resecurity has identified a dangerous new development in the underground cybercrime market, the rise of DIG AI. This uncensored artificial intelligence…

Arcane Werewolf Hacker Group Expands Arsenal with Loki 2.1 Malware Toolkit
22
Dec
2025

Arcane Werewolf Hacker Group Expands Arsenal with Loki 2.1 Malware Toolkit

The cyber espionage group known as Arcane Werewolf (also tracked as Mythic Likho) has significantly upgraded its offensive capabilities, targeting…

Docker Releases Free, Production-Grade Hardened Container Images
22
Dec
2025

Docker Releases Free, Production-Grade Hardened Container Images

Docker has released its production-grade hardened container images as a free, open-source offering, marking a significant shift in software supply…

Sleeping Bouncer Vulnerability Impacts Gigabyte, MSI, ASRock, and ASUS Motherboards
22
Dec
2025

Sleeping Bouncer Vulnerability Impacts Gigabyte, MSI, ASRock, and ASUS Motherboards

A critical firmware vulnerability affecting motherboards from major manufacturers including Gigabyte, MSI, ASRock, and ASUS has been discovered by Riot…

PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel POSIX CPU Timers
22
Dec
2025

PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel POSIX CPU Timers

A critical race condition vulnerability in the Linux kernel’s POSIX CPU timers has been exposed through a detailed proof-of-concept, one…

Microsoft Brokering File System Vulnerability Enables Local Privilege Escalation
22
Dec
2025

Microsoft Brokering File System Vulnerability Enables Local Privilege Escalation

Microsoft has addressed a critical use-after-free vulnerability in its Brokering File System (BFS) driver that could allow attackers to escalate…