Category: GBHackers

Threat Actors Use Compromised RDP to Deploy Lynx Ransomware After Deleting Backups
18
Nov
2025

Threat Actors Use Compromised RDP to Deploy Lynx Ransomware After Deleting Backups

A sophisticated threat actor has orchestrated a multi-stage ransomware attack spanning nine days, leveraging compromised Remote Desktop Protocol (RDP) credentials…

W3 Total Cache Security Vulnerability Exposes One Million WordPress Sites to RCE
18
Nov
2025

W3 Total Cache Security Vulnerability Exposes One Million WordPress Sites to RCE

A critical security flaw has been discovered in the widely used W3 Total Cache WordPress plugin, putting over 1 million…

Microsoft Entra Invitations Hijacked in Surge of TOAD Phishing Attacks
18
Nov
2025

Microsoft Entra Invitations Hijacked in Surge of TOAD Phishing Attacks

A newly identified phishing campaign is exploiting Microsoft Entra tenant invitation functionality to orchestrate TOAD (Telephone-Oriented Attack Delivery) attacks against…

Pre-Installed Spyware Found on Samsung Galaxy Devices and Cannot Be Removed
18
Nov
2025

Pre-Installed Spyware Found on Samsung Galaxy Devices and Cannot Be Removed

Samsung users across West Asia and North Africa are raising serious privacy concerns over AppCloud. This pre-installed bloatware application collects…

AI-Powered Expansion of Pig Butchering Scam Operations
18
Nov
2025

AI-Powered Expansion of Pig Butchering Scam Operations

Pig-butchering scams, the sophisticated long-con investment fraud schemes that have plagued millions globally, have reached unprecedented scale through the strategic…

Google Launches Public Preview of Its Alert Triage and Investigation Agent for Security Operations
18
Nov
2025

Google Launches Public Preview of Its Alert Triage and Investigation Agent for Security Operations

Google has taken a significant step toward its vision of an Agentic SOC by announcing the public preview of the…

New Tool Blocks Network Traffic to Bypass EDR and Antivirus
18
Nov
2025

New Tool Blocks Network Traffic to Bypass EDR and Antivirus

A newly released open-source tool called SilentButDeadly is raising security concerns by demonstrating how attackers can effectively turn off Endpoint…

Operating principle of secp256k1-ECIES.
18
Nov
2025

Encryption Mechanics, Operational Model, and Data Exfiltration Methods

A newly identified ransomware group, Yurei, has emerged as a significant threat to organizations worldwide, with confirmed attacks targeting entities…

CISA Alerts on Critical Lynx+ Gateway Flaw Leaks Data in Cleartext
18
Nov
2025

CISA Alerts on Critical Lynx+ Gateway Flaw Leaks Data in Cleartext

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert regarding multiple vulnerabilities affecting General Industrial Controls’…

Inside the Criminal Networks Hijacking Payroll Systems
18
Nov
2025

Inside the Criminal Networks Hijacking Payroll Systems

Cyber threats don’t always come with warning signs. Sometimes, they arrive as sponsored ads. Since mid-2023, a financially motivated network…

70 Million Devices Vulnerable Due to Logic Flaw Exposing Internal Networks
18
Nov
2025

70 Million Devices Vulnerable Due to Logic Flaw Exposing Internal Networks

A critical logic flaw discovered in the widely used mPDF PHP library could expose internal networks and sensitive services on…

Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea
17
Nov
2025

Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea

Menlo Park, California, USA, November 17th, 2025, CyberNewsWire AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms (CNAPP),…