Category: GBHackers

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data
03
Mar
2025

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed “Poco RAT,” has emerged as a potent espionage tool in a campaign targeting Spanish-speaking…

Google Launches Shielded Email to Keep Your Address Hidden from Apps
03
Mar
2025

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and services from accessing users’ primary…

Exploiting Amazon IAM Permissions for Phishing Attacks
03
Mar
2025

Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in Amazon Web Services (AWS) environments…

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware
03
Mar
2025

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell and legitimate Microsoft applications to…

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities - GBHackers Security
02
Mar
2025

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities – GBHackers Security

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking vulnerability in modern dashcam technology, exposing…

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations
28
Feb
2025

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved into a sophisticated tool for cyber…

Chinese Hackers Breach Belgium State Security Service as Investigation Continues
28
Feb
2025

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe security breach to date. For…

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access
28
Feb
2025

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new threat: “Pass-the-Cookie” attacks. Recent findings reveal…

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security
28
Feb
2025

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM Java Agent, potentially enabling attackers…

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally
28
Feb
2025

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check Point VPN vulnerability (CVE-2024-24919) to…

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data
28
Feb
2025

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has been uncovered, exposing a dangerous…

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords
28
Feb
2025

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large language models (LLMs) like DeepSeek—has uncovered…