Category: GBHackers

Russian Calisto Hackers Target NATO Research with ClickFix Malware
05
Dec
2025

Russian Calisto Hackers Target NATO Research with ClickFix Malware

Russian intelligence-linked cyber threat actors have intensified their operations against NATO research organizations, Western defense contractors, and NGOs supporting Ukraine,…

Russian Hackers Imitate European Events in Coordinated Phishing Campaigns
05
Dec
2025

Russian Hackers Imitate European Events in Coordinated Phishing Campaigns

Russian state-linked hackers are impersonating high-profile European security conferences to compromise cloud email and collaboration accounts at governments, think tanks,…

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access
05
Dec
2025

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access

The cybersecurity landscape continues to evolve as threat actors deploy increasingly sophisticated tools to compromise Windows-based infrastructure. CastleRAT, a Remote…

New SVG Technique Enables Highly Interactive Clickjacking Attacks
05
Dec
2025

New SVG Technique Enables Highly Interactive Clickjacking Attacks

A security researcher has unveiled a novel web exploitation technique dubbed “SVG clickjacking,” which significantly elevates the sophistication of traditional…

New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer
05
Dec
2025

New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer

Cybersecurity researchers uncover a sophisticated Linux campaign that blends legacy botnet capabilities with modern evasion techniques. A newly discovered Linux…

CISA, NSA Alert on BRICKSTORM Malware Targeting VMware ESXi and Windows Systems
05
Dec
2025

CISA, NSA Alert on BRICKSTORM Malware Targeting VMware ESXi and Windows Systems

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA), joined by Canadian cyber authorities, have issued…

Session Cookie Theft and MFA Bypass Tactics
05
Dec
2025

Session Cookie Theft and MFA Bypass Tactics

Security researchers are issuing urgent warnings about a rising wave of cyberattacks leveraging Evilginx, an attacker-in-the-middle phishing toolkit that intercepts…

Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted
05
Dec
2025

Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted

Kohler’s Dekota toilet camera, launched in October as a $600 health-monitoring device, is facing significant scrutiny over its privacy claims….

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware
05
Dec
2025

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware

Despite extensive scrutiny and public reporting, commercial surveillance vendors continue to operate with alarming sophistication. Intellexa, a prominent mercenary spyware…

Chained Synology BeeStation Vulnerabilities Enable Root Privilege Escalation via Task Scheduler Exploit
05
Dec
2025

Chained Synology BeeStation Vulnerabilities Enable Root Privilege Escalation via Task Scheduler Exploit

While preparing for Pwn2Own Ireland 2025, a security researcher revisiting N-day bugs in Synology NAS has demonstrated a powerful new…

New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT
05
Dec
2025

New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT

In November 2025, security researchers at Raven AI identified a sophisticated zero-day phishing campaign impersonating the Income Tax Department of…

Threat Actors Exploit Foxit PDF Reader to Seize System Access and Steal Data
05
Dec
2025

Threat Actors Exploit Foxit PDF Reader to Seize System Access and Steal Data

A sophisticated malware campaign is leveraging a weaponized Foxit PDF Reader to target job seekers through email-based attacks, deploying ValleyRAT….