Category: GBHackers

Cavalry Werewolf Launches Cyberattack on Government Agencies to Deploy Network Backdoor
07
Nov
2025

Cavalry Werewolf Launches Cyberattack on Government Agencies to Deploy Network Backdoor

In July 2025, Doctor Web’s anti-virus laboratory received a critical alert from a government-owned organization within the Russian Federation. The…

Sandworm Hackers Target Ukrainian Organizations With Data-Wiping Malware
07
Nov
2025

Sandworm Hackers Target Ukrainian Organizations With Data-Wiping Malware

Russia-aligned threat actor Sandworm has intensified its destructive cyber operations against Ukrainian organizations, deploying data wiper malware to cripple critical…

Amazon WorkSpaces for Linux Vulnerability Exposes Valid Auth Tokens to Attackers
07
Nov
2025

Amazon WorkSpaces for Linux Vulnerability Exposes Valid Auth Tokens to Attackers

A recently disclosed vulnerability in the Amazon WorkSpaces client for Linux exposes a critical security flaw that could allow attackers…

Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication
06
Nov
2025

Airstalk Malware Exploits AirWatch MDM for Covert C2 Communication

Security researchers have identified a sophisticated new malware family, Airstalk, that exploits VMware’s AirWatch API—now known as Workspace ONE Unified…

Dissecting the $128M Balancer Pool Drain in Under 30 Minutes
06
Nov
2025

Dissecting the $128M Balancer Pool Drain in Under 30 Minutes

In the early hours of November 3, 2025, Check Point Research’s blockchain threat monitoring systems flagged a suspicious pattern on…

Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability
06
Nov
2025

Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability

Cisco has issued a critical warning about ongoing attacks targeting a severe remote code execution vulnerability affecting its Secure Firewall,…

Critical Bug in Midnight Ransomware Tool Unlocks File Recovery
06
Nov
2025

Critical Bug in Midnight Ransomware Tool Unlocks File Recovery

In the ever-evolving landscape of cyber threats, a new ransomware strain, Midnight, has emerged, echoing the notorious tactics of its…

HTTP/2 ‘MadeYouReset’ Vulnerability Enable Denial-of-Service (DoS) Attacks
06
Nov
2025

HTTP/2 ‘MadeYouReset’ Vulnerability Enable Denial-of-Service (DoS) Attacks

A critical vulnerability discovered across numerous HTTP/2 implementations has exposed a dangerous protocol-level vulnerability that enables threat actors to orchestrate…

AI Browsers That Beat Paywalls by Imitating Humans
06
Nov
2025

AI Browsers That Beat Paywalls by Imitating Humans

The emergence of AI-powered browsers represents a significant shift in how artificial intelligence interacts with web content. However, it has…

Iranian Hackers Exploit RMM Tools to Target Academics and Foreign-Policy Experts
06
Nov
2025

Iranian Hackers Exploit RMM Tools to Target Academics and Foreign-Policy Experts

Proofpoint Threat Research has identified a previously unknown Iranian threat actor, dubbed UNK_SmudgedSerpent, that conducted sophisticated phishing campaigns against academics…

Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2
06
Nov
2025

Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2

Security researchers have uncovered a sophisticated attack campaign attributed to Kimsuky, the North Korean-backed threat group known for conducting espionage…

Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code
06
Nov
2025

Cisco UCCX Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code

Cisco has issued a critical security advisory addressing two severe vulnerabilities in its Unified Contact Center Express (CCX) platform that…