Category: GBHackers

Massive Hacking Operation WrtHug Compromises Thousands of ASUS Routers Worldwide
21
Nov
2025

Massive Hacking Operation WrtHug Compromises Thousands of ASUS Routers Worldwide

Your home router, the device connecting you to the internet, may have been silently compromised as part of a coordinated…

TamperedChef Campaign Exploits Everyday Apps to Deploy Malware and Enable Remote Access
21
Nov
2025

TamperedChef Campaign Exploits Everyday Apps to Deploy Malware and Enable Remote Access

The Acronis Threat Research Unit has uncovered a sophisticated global malvertising campaign called TamperedChef that disguises malware as legitimate everyday…

Emerging Ransomware Variants Exploit Amazon S3 Misconfigurations
21
Nov
2025

Emerging Ransomware Variants Exploit Amazon S3 Misconfigurations

Ransomware is shifting from traditional systems to cloud environments, fundamentally redefining its impact on cloud-native data. As organizations increasingly migrate…

CISA Alerts Users to Active Attacks on Chrome 0-Day Vulnerability
21
Nov
2025

CISA Alerts Users to Active Attacks on Chrome 0-Day Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Google Chrome to its Known Exploited Vulnerabilities…

Sturnus Malware Hijacks Signal and WhatsApp, Taking Full Device Control
21
Nov
2025

Sturnus Malware Hijacks Signal and WhatsApp, Taking Full Device Control

MTI Security researchers have uncovered a new, particularly advanced Android banking trojan, dubbed Sturnus, that targets users’ financial and personal…

Samourai Wallet Founders Jailed for $237M Crypto Laundering
21
Nov
2025

Samourai Wallet Founders Jailed for $237M Crypto Laundering

The co-founders of Samourai Wallet, a cryptocurrency mixing service that facilitated over $237 million in illegal transactions, have been sentenced…

Tsundere Botnet Targets Windows, Linux & macOS via Node.js Packages
20
Nov
2025

Tsundere Botnet Targets Windows, Linux & macOS via Node.js Packages

A Russian-speaking threat actor attributed to the username “koneko” has resurfaced with a sophisticated new botnet named Tsundere, discovered by…

7-Zip RCE Vulnerability Actively Exploited by Hackers
20
Nov
2025

7-Zip RCE Vulnerability Actively Exploited by Hackers

Cybersecurity researchers have reported active exploitation of a critical vulnerability in 7-Zip, the popular file compression software used by millions…

Ollama Flaws Let Hackers Run Any Code Using Malicious Model Files
20
Nov
2025

Ollama Flaws Let Hackers Run Any Code Using Malicious Model Files

Critical security vulnerabilities discovered in Ollama, one of GitHub’s most popular open-source projects with over 155,000 stars, could allow attackers…

Researchers Detail Rhadamanthys Loader’s Advanced Anti-Sandboxing and Anti-AV Emulation Techniques
20
Nov
2025

Researchers Detail Rhadamanthys Loader’s Advanced Anti-Sandboxing and Anti-AV Emulation Techniques

Rhadamanthys, a sophisticated information-stealing malware active since 2022, has drawn renewed attention from security researchers who recently published an in-depth…

NSA Issues New Guidance to Help ISPs and Defenders Stop Malicious Activity
20
Nov
2025

NSA Issues New Guidance to Help ISPs and Defenders Stop Malicious Activity

The National Security Agency (NSA), CISA, FBI, and international cybersecurity partners have released groundbreaking guidance to help internet service providers and network…

Chinese APT Group Exploits DLL Sideloading to Breach Government and Media Targets
20
Nov
2025

Chinese APT Group Exploits DLL Sideloading to Breach Government and Media Targets

A China-nexus advanced persistent threat (APT) group has been conducting a sustained espionage campaign targeting government and media sectors across…