Category: GBHackers

New Detection Methods Uncovered for Outlook NotDoor Backdoor Malware
17
Nov
2025

New Detection Methods Uncovered for Outlook NotDoor Backdoor Malware

Cybersecurity researchers have unveiled comprehensive detection methodologies for NotDoor, a sophisticated backdoor malware that leverages Microsoft Outlook macros for covert…

North Korean Hackers Breach 136 U.S. Companies, Earning $2.2 Million
17
Nov
2025

North Korean Hackers Breach 136 U.S. Companies, Earning $2.2 Million

The U.S. Justice Department has announced a significant crackdown on North Korean cybercrime operations, securing five guilty pleas and initiating…

Alice Blue Partners With AccuKnox For Regulatory Compliance
17
Nov
2025

Alice Blue Partners With AccuKnox For Regulatory Compliance

AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms(CNAPP), today announced its partnership with Alice Blue India, a…

Iran-Linked SpearSpecter Campaign Leveraging Personalized Social Engineering Against High-Value Officials
17
Nov
2025

Iran-Linked SpearSpecter Campaign Leveraging Personalized Social Engineering Against High-Value Officials

Iranian threat actors aligned with the Islamic Revolutionary Guard Corps Intelligence Organization (IRGC-IO) are conducting a sophisticated espionage campaign tracked…

Critical RCE Flaws in AI Inference Engines Expose Meta, Nvidia, and Microsoft Frameworks
17
Nov
2025

Critical RCE Flaws in AI Inference Engines Expose Meta, Nvidia, and Microsoft Frameworks

Security researchers at Oligo Security have uncovered a series of critical Remote Code Execution vulnerabilities affecting widely deployed AI inference…

IBM AIX Flaw Allows Remote Attackers to Run Arbitrary Commands
17
Nov
2025

IBM AIX Flaw Allows Remote Attackers to Run Arbitrary Commands

IBM has released critical security updates addressing four severe vulnerabilities in AIX and VIOS systems that could allow remote attackers…

EVALUATION Campaign Using ClickFix Technique to Deploy Amatera Stealer and NetSupport RAT
17
Nov
2025

EVALUATION Campaign Using ClickFix Technique to Deploy Amatera Stealer and NetSupport RAT

eSentire’s Threat Response Unit (TRU) has uncovered a sophisticated malware campaign leveraging the ClickFix social engineering technique to distribute Amatera…

Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection
14
Nov
2025

Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection

Jamf Threat Labs has identified a new family of malicious stealers tracked as DigitStealer, representing a significant evolution in macOS-targeted…

NVIDIA NeMo Flaw Enables Code Injection and Privilege Escalation Attacks
14
Nov
2025

NVIDIA NeMo Flaw Enables Code Injection and Privilege Escalation Attacks

NVIDIA has released critical security patches addressing two high-severity vulnerabilities in its NeMo Framework that could allow attackers to execute…

Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges
14
Nov
2025

Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges

A critical security vulnerability has been identified in the Cisco Catalyst Center Virtual Appliance that could enable authenticated, remote attackers…

Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers
14
Nov
2025

Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers

Cisco has disclosed critical security vulnerabilities affecting Cisco Unified Contact Center Express (Unified CCX) that could enable unauthenticated, remote attackers…

A piece of the code inside the vbs file with the last line commented out.
14
Nov
2025

Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials

Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT)…