Category: GBHackers

Ferocious Kitten APT Uses MarkiRAT for Keystroke and Clipboard Surveillance
11
Nov
2025

Ferocious Kitten APT Uses MarkiRAT for Keystroke and Clipboard Surveillance

Ferocious Kitten, a covert cyber-espionage group active since at least 2015, has emerged as a persistent threat to Persian-speaking dissidents…

Devolutions Server Flaw Allows Attackers to Impersonate Users via Pre-MFA Cookie
11
Nov
2025

Devolutions Server Flaw Allows Attackers to Impersonate Users via Pre-MFA Cookie

Devolutions Server has been found vulnerable to a critical security flaw that allows low-privileged authenticated users to impersonate other accounts…

Attackers Use Quantum Route Redirect to Launch Instant Phishing on M365
11
Nov
2025

Attackers Use Quantum Route Redirect to Launch Instant Phishing on M365

KnowBe4 Threat Labs has uncovered a sophisticated phishing campaign that marks a turning point in cybercriminal capabilities. The threat landscape…

Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins
11
Nov
2025

Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins

A sophisticated phishing campaign is currently targeting email users with deceptive security alert notifications that appear to originate from their…

65% of Top AI Firms Found Exposing Verified API Keys and Tokens on GitHub
11
Nov
2025

65% of Top AI Firms Found Exposing Verified API Keys and Tokens on GitHub

A comprehensive security analysis has uncovered a troubling reality: 65% of leading AI companies have leaked verified secrets on GitHub,…

Researchers Expose Deep Connections Between Maverick and Coyote Banking Malware
11
Nov
2025

Researchers Expose Deep Connections Between Maverick and Coyote Banking Malware

Security researchers at CyberProof have uncovered critical connections between two sophisticated banking trojans Maverick and Coyote that are actively targeting…

CISA Issues Alert on Samsung 0-Day RCE Flaw Actively Exploited in Attacks
11
Nov
2025

CISA Issues Alert on Samsung 0-Day RCE Flaw Actively Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical remote code execution vulnerability affecting Samsung mobile devices to…

Lazarus Group Deploys Weaponized Documents Against Aerospace & Defense
11
Nov
2025

Lazarus Group Deploys Weaponized Documents Against Aerospace & Defense

Security researchers at ENKI have uncovered a sophisticated espionage campaign targeting aerospace and defense organizations, in which the Lazarus Group…

Hackers Exploit Triofox 0-Day to Deploy Malicious Payloads Using Anti-Virus Feature
11
Nov
2025

Hackers Exploit Triofox 0-Day to Deploy Malicious Payloads Using Anti-Virus Feature

Cybersecurity researchers from Mandiant Threat Defense have uncovered a critical zero-day vulnerability in Gladinet’s Triofox file-sharing platform that allowed attackers…

MAD-CAT “Meow” Tool Sparks Real-World Data Corruption Attacks
10
Nov
2025

MAD-CAT “Meow” Tool Sparks Real-World Data Corruption Attacks

The infamous Meow attack, which devastated unsecured databases since 2020, has resurfaced with renewed force through MAD-CAT (Meow Attack Data Corruption Automation…

Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America
10
Nov
2025

Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America

Menlo Park, CA, USA, November 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud-Native Application Protection Platforms (CNAPP), announced…

Android Users Hit by Malware Disguised as Relaxation Programs
10
Nov
2025

Android Users Hit by Malware Disguised as Relaxation Programs

A sophisticated new cyberattack targeting Android devices in South Korea has been uncovered, leveraging Google’s asset-tracking feature, Find Hub, to…