Category: GBHackers

Kimwolf Android Botnet Compromises 1.8 Million Devices Worldwide
18
Dec
2025

Kimwolf Android Botnet Compromises 1.8 Million Devices Worldwide

A newly discovered Android botnet dubbed “Kimwolf” has silently compromised over 1.8 million devices globally, primarily targeting Android TV boxes…

Cybercriminals Registering Fake Shopping Domains to Target Users This Holiday Season
18
Dec
2025

Cybercriminals Registering Fake Shopping Domains to Target Users This Holiday Season

As the global holiday shopping season reaches its peak, cybersecurity researchers have uncovered a massive, industrialized operation designed to defraud…

Phantom Stealer Targeting Users to Steal Sensitive Data
18
Dec
2025

Phantom Stealer Targeting Users to Steal Sensitive Data

Sophisticated malware employs a multi-stage infection chain and advanced evasion techniques to exfiltrate sensitive information. Phantom, a sophisticated stealer malware…

Critical Apache Commons Text Flaw Lets Hackers Execute Remote Code
18
Dec
2025

Critical Apache Commons Text Flaw Lets Hackers Execute Remote Code

A critical remote code execution vulnerability has been discovered in Apache Commons Text, affecting all versions prior to 1.10.0. The…

Chinese Ink Dragon Breaches European Government Networks, Affecting Asia and South America
18
Dec
2025

Chinese Ink Dragon Breaches European Government Networks, Affecting Asia and South America

Ink Dragon, a Chinese espionage group, has significantly expanded its operational reach from Southeast Asia and South America into European…

Hackers Actively Exploit SonicWall SMA1000 Zero-Day to Escalate Privileges
18
Dec
2025

Hackers Actively Exploit SonicWall SMA1000 Zero-Day to Escalate Privileges

SonicWall has issued an urgent security advisory warning of active exploitation of a local privilege escalation vulnerability affecting its SMA1000…

New Reports Reveal WAFs Are Ineffective Against Latest React2Shell Exploit
18
Dec
2025

New Reports Reveal WAFs Are Ineffective Against Latest React2Shell Exploit

TEL AVIV, Israel, Dec. 17, 2025 Miggo Security has released a comprehensive benchmark study revealing critical gaps in Web Application Firewall…

Hackers Actively Target Cisco and Palo Alto VPN Gateways to Steal Login Credentials
18
Dec
2025

Hackers Actively Target Cisco and Palo Alto VPN Gateways to Steal Login Credentials

Cybersecurity researchers at GreyNoise have identified a large-scale, coordinated campaign targeting enterprise VPN authentication systems. The attackers are systematically attempting…

Microsoft 365 Outage Disrupts Teams, Outlook, and Copilot in Japan and China
18
Dec
2025

Microsoft 365 Outage Disrupts Teams, Outlook, and Copilot in Japan and China

Thousands of users across Japan and China experienced significant disruptions to Microsoft 365 services on Thursday morning due to a…

Critical Node.js Library Flaw Lets Hackers Execute Remote Commands on Windows
18
Dec
2025

Critical Node.js Library Flaw Lets Hackers Execute Remote Commands on Windows

A severe command injection vulnerability has been discovered in systeminformation, a widely-used Node.js library for retrieving system information. The flaw,…

GhostPoster Attack Uses PNG Icons to Compromise 50,000 Firefox Users
18
Dec
2025

GhostPoster Attack Uses PNG Icons to Compromise 50,000 Firefox Users

A sophisticated malware campaign dubbed “GhostPoster” has compromised approximately 50,000 Firefox users by exploiting browser extension icons. Security researchers at…

CISA Adds Actively Exploited Fortinet Signature Verification Flaw to KEV Catalog
18
Dec
2025

CISA Adds Actively Exploited Fortinet Signature Verification Flaw to KEV Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added CVE-2025-59718 to its Known Exploited Vulnerabilities (KEV) catalog, marking the…