Category: GBHackers

Android App on Google Play Targets Indian Users to Steal Login Credentials
24
Feb
2025

Android App on Google Play Targets Indian Users to Steal Login Credentials

A malicious Android application, Finance Simplified (package: com.someca.count), has been identified on the Google Play Store, targeting Indian users under…

Smart Bed Security Flaw Lets Hackers Access Other Network Devices
24
Feb
2025

Smart Bed Security Flaw Lets Hackers Access Other Network Devices

A security researcher has uncovered critical vulnerabilities in Eight Sleep’s internet-connected smart beds, revealing exposed Amazon Web Services (AWS) credentials,…

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers
24
Feb
2025

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as stablecoin banking platform @0xinfini fell victim…

Apple Removes Advanced Data Protection (ADP) for UK Users
24
Feb
2025

Apple Removes Advanced Data Protection (ADP) for UK Users

Apple has discontinued its Advanced Data Protection (ADP) feature for UK users following a legal demand from the British government…

Wireshark 4.4.4 Released – Explore the Latest Features!
24
Feb
2025

Wireshark 4.4.4 Released – Explore the Latest Features!

The Wireshark Foundation has announced the release of Wireshark 4.4.4, the latest iteration of the world’s most widely used network…

LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability
24
Feb
2025

LockBit Ransomware Strikes: Exploiting a Confluence Vulnerability

In a swift and highly coordinated attack, LockBit ransomware operators exploited a critical remote code execution vulnerability (CVE-2023-22527) in Atlassian…

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems
24
Feb
2025

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within the cybercrime ecosystem. First identified in…

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials
24
Feb
2025

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials

A sophisticated phishing campaign impersonating OpenAI’s ChatGPT Premium subscription service has surged globally, targeting users with fraudulent payment requests to…

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability
24
Feb
2025

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability

Security researchers have disclosed critical details about CVE-2025-20029, a command injection vulnerability in F5’s BIG-IP Traffic Management Shell (TMSH) command-line interface….

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released
24
Feb
2025

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released

A critical zero-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed after seven months of unresolved reporting, enabling…

Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL
24
Feb
2025

Exim Mail Transfer Vulnerability Allows Attackers to Inject Malicious SQL

A newly disclosed vulnerability in the Exim mail transfer agent (CVE-2025-26794) has sent shockwaves through the cybersecurity community, revealing a…

Bybit Hacked - Hackers Stole $1.46 Billion Worth Crypto From Wallet
24
Feb
2025

Bybit Hacked – Hackers Stole $1.46 Billion Worth Crypto From Wallet

In what has become the largest cryptocurrency theft in history, hackers infiltrated Bybit’s Ethereum cold wallet on February 21, 2025,…