Category: GBHackers

Files Locked, Backups Erased, and Remote Access Disabled
30
Jan
2025

Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated threat. This Ransomware-as-a-Service (RaaS) operation,…

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages
30
Jan
2025

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed “Tria Stealer,” which exploits fake wedding invitations…

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments
30
Jan
2025

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed by cybersecurity researchers. Introduced by…

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability
30
Jan
2025

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass, is facing scrutiny after the…

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware
30
Jan
2025

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS and Windows users. Researchers revealed this…

Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability
30
Jan
2025

Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability

In a critical development within the AI industry, researchers at Noma Security have disclosed the discovery of a high-severity Remote…

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks
30
Jan
2025

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks

Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in government websites to further phishing campaigns….

Hackers Sell Compromised Emails and Google Ads Accounts on Dark Web
30
Jan
2025

Hackers Sell Compromised Emails and Google Ads Accounts on Dark Web

A new wave of cybercrime is surfacing as hackers exploit compromised emails and digital advertising platforms to create a thriving…

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device
30
Jan
2025

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate and far-reaching operation of the Lazarus…

CISA Releases Seven ICS Advisories to Strengthen Cybersecurity Posture
30
Jan
2025

CISA Releases Seven ICS Advisories to Strengthen Cybersecurity Posture

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued seven Industrial Control Systems (ICS) advisories, highlighting critical vulnerabilities in…

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely
30
Jan
2025

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has been identified as an operation spearheaded…

TeamViewer Clients Vulnerability Leads to Privilege Escalation
30
Jan
2025

TeamViewer Clients Vulnerability Leads to Privilege Escalation

TeamViewer, a widely used remote access software, has announced a critical vulnerability in its Windows clients. The company disclosed on…