Category: GBHackers

Targeted Phishing Attack Strikes HubSpot Users
19
Dec
2025

Targeted Phishing Attack Strikes HubSpot Users

Evalian’s Security Operations Centre has uncovered an active, sophisticated phishing campaign targeting HubSpot customers, combining business email compromise (BEC) tactics…

Amazon Identified North Korean IT Worker by Tracking Keystroke Activity
19
Dec
2025

Amazon Identified North Korean IT Worker by Tracking Keystroke Activity

Amazon has uncovered a North Korean imposter posing as a U.S.-based systems administrator. The discovery was made not through traditional…

New Linux Kernel Rust Vulnerability Triggers System Crashes
19
Dec
2025

New Linux Kernel Rust Vulnerability Triggers System Crashes

A critical race condition vulnerability has been discovered in the Linux kernel’s Rust Binder module, potentially causing system crashes and…

Actively Exploited ASUS Vulnerability Added to CISA’s KEV List
19
Dec
2025

Actively Exploited ASUS Vulnerability Added to CISA’s KEV List

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical ASUS vulnerability to its Known Exploited Vulnerabilities (KEV) catalog,…

GachiLoader Deploys Payloads Using Obfuscated Node.js Malware
19
Dec
2025

GachiLoader Deploys Payloads Using Obfuscated Node.js Malware

Check Point Research has uncovered a sophisticated malware distribution campaign leveraging the YouTube Ghost Network to deploy GachiLoader, a novel,…

.NET Integration Library Steals Crypto Wallets and OAuth Tokens
19
Dec
2025

.NET Integration Library Steals Crypto Wallets and OAuth Tokens

ReversingLabs (RL) researchers have uncovered a sophisticated malware campaign targeting the .NET developer ecosystem via the NuGet package manager. The…

FBI Shuts Down Crypto Exchange Linked to Criminal Money Laundering Operations
19
Dec
2025

FBI Shuts Down Crypto Exchange Linked to Criminal Money Laundering Operations

The United States Attorney’s Office for the Eastern District of Michigan announced a coordinated international enforcement action targeting E-Note, a…

HPE OneView Vulnerability Allows Remote Code Execution Attacks
19
Dec
2025

HPE OneView Vulnerability Allows Remote Code Execution Attacks

A severe security vulnerability has been discovered in Hewlett Packard Enterprise OneView software, threatening enterprise infrastructure across data centers and…

APT35 Leak Reveals Spreadsheets Containing Domains, Payments, and Server Information
19
Dec
2025

APT35 Leak Reveals Spreadsheets Containing Domains, Payments, and Server Information

Iranian cyber unit Charming Kitten, officially designated APT35, has long been dismissed as a noisy but relatively unsophisticated threat actor…

Beware of Malicious Scripts in Weaponized PDF Purchase Orders
19
Dec
2025

Beware of Malicious Scripts in Weaponized PDF Purchase Orders

A sophisticated phishing campaign utilizing a weaponized PDF document named “NEW Purchase Order # 52177236.pdf” has been identified, employing legitimate…

New Lazarus and Kimsuky Infrastructure Discovered with Active Tools and Tunneling Nodes
19
Dec
2025

New Lazarus and Kimsuky Infrastructure Discovered with Active Tools and Tunneling Nodes

Security researchers from Hunt.io and Acronis Threat Research Unit have uncovered a sophisticated network of operational infrastructure controlled by North…

RansomHouse RaaS Enhances Double Extortion with Data Theft and Encryption
19
Dec
2025

RansomHouse RaaS Enhances Double Extortion with Data Theft and Encryption

RansomHouse, a ransomware-as-a-service (RaaS) operation managed by the threat group Jolly Scorpius, has significantly enhanced its encryption capabilities, marking a…