Category: GBHackers

Android Users Hit by Malware Disguised as Relaxation Programs
10
Nov
2025

Android Users Hit by Malware Disguised as Relaxation Programs

A sophisticated new cyberattack targeting Android devices in South Korea has been uncovered, leveraging Google’s asset-tracking feature, Find Hub, to…

NuGet Supply-Chain Exploit Uses Timed Destructive Payloads Against ICS
10
Nov
2025

NuGet Supply-Chain Exploit Uses Timed Destructive Payloads Against ICS

A sophisticated supply chain attack has compromised critical industrial control systems through nine malicious NuGet packages designed to inject time-delayed…

Popular npm Library Used in AI and NLP Projects Exposes Systems to RCE
10
Nov
2025

Popular npm Library Used in AI and NLP Projects Exposes Systems to RCE

A critical remote code execution vulnerability has been discovered in the widely used JavaScript library expr-eval, affecting thousands of projects…

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses
10
Nov
2025

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses

Threat actors are systematically compromising Outlook and Google mailboxes with alarming success, leveraging sophisticated techniques that sidestep traditional email defenses…

LangGraph Deserialization Flaw Enables Execution of Malicious Python Code
10
Nov
2025

LangGraph Deserialization Flaw Enables Execution of Malicious Python Code

A critical remote code execution vulnerability has been discovered in LangGraph’s checkpoint serialization library, affecting versions before 3.0. The flaw…

HackGPT Launches as AI-Driven Penetration Testing Suite Using GPT-4 and Other Models
10
Nov
2025

HackGPT Launches as AI-Driven Penetration Testing Suite Using GPT-4 and Other Models

HackGPT Enterprise has officially launched as a production-ready, cloud-native AI-powered penetration testing platform designed specifically for enterprise security teams. Created…

Ransomware Operators Exploit RMM Tools to Deploy Medusa and DragonForce
10
Nov
2025

Ransomware Operators Exploit RMM Tools to Deploy Medusa and DragonForce

Cybersecurity researchers at Zensec have exposed a sophisticated supply-chain attack campaign that weaponised trusted Remote Monitoring and Management (RMM) infrastructure…

Hackers Exploit Websites to Inject Malicious Links for SEO Manipulation
10
Nov
2025

Hackers Exploit Websites to Inject Malicious Links for SEO Manipulation

A surge in online casino spam is reshaping the dark corners of the internet, with threat actors increasingly hacking websites…

Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case
10
Nov
2025

Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case

An extract from “The Enemy Inside, the Paragon Case, Spies and Regime Methods in Giorgia Meloni’s Italy” by Francesco Cancellato,…

APT Groups Target Construction Firms to Steal RDP, SSH, and Citrix Credentials
10
Nov
2025

APT Groups Target Construction Firms to Steal RDP, SSH, and Citrix Credentials

The construction industry has emerged as a primary target for sophisticated cyber adversaries in 2025, with threat actors including state-sponsored…

Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company
10
Nov
2025

Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company

Intel is pursuing legal action against a former software engineer who the company claims downloaded thousands of confidential files shortly…

Hackers Abuse runc Tool to Escape Containers and Compromise Hosts
10
Nov
2025

Hackers Abuse runc Tool to Escape Containers and Compromise Hosts

Three critical vulnerabilities in runc, the widely-used container runtime that powers Docker and Kubernetes, have been disclosed, allowing attackers to…