Category: GBHackers

Ransomware Actors Target VMware Deployments
24
Oct
2025

Ransomware Actors Target VMware Deployments

The Agenda ransomware group has evolved its attack methodology with a sophisticated technique that deploys Linux ransomware variants directly on…

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars - GBHackers Security
24
Oct
2025

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars – GBHackers Security

SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious…

TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT
23
Oct
2025

TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT

In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and…

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process
23
Oct
2025

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process

Atlassian has disclosed a critical path traversal vulnerability affecting Jira Software Data Center and Server that could allow authenticated attackers…

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion
23
Oct
2025

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion

Cybersecurity researchers at Wordfence Threat Intelligence and their Care and Response teams have observed a persistent trend in new malware…

Global SMS Phishing Campaign Traced to China Targets Users Worldwide
23
Oct
2025

Global SMS Phishing Campaign Traced to China Targets Users Worldwide

A sophisticated and widespread smishing campaign originating from China has emerged as a significant threat to users worldwide. Researchers have…

Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography
23
Oct
2025

Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Cybersecurity researchers at Arctic Wolf Labs have uncovered a cunning new threat dubbed Caminho, a Brazilian Loader-as-a-Service (LaaS) that’s turning…

Vulnerability in Perplexity’s Comet Browser Screenshot Feature Allows Malicious Prompt Injection
23
Oct
2025

Vulnerability in Perplexity’s Comet Browser Screenshot Feature Allows Malicious Prompt Injection

Researchers have discovered a critical security vulnerability in Perplexity’s Comet AI browser that allows attackers to inject malicious commands through…

Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers
23
Oct
2025

Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers

Scammers have intensified their efforts to defraud vulnerable populations through sophisticated impersonation schemes and fraudulent financial aid offers, according to…

Active Exploits Target Magento and Adobe Commerce RCE, Attackers Inject Webshells
23
Oct
2025

Active Exploits Target Magento and Adobe Commerce RCE, Attackers Inject Webshells

Unauthenticated attackers are actively exploiting a critical vulnerability affecting Adobe Commerce and Magento platforms worldwide. The flaw, tracked as CVE-2025-54236…

Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams
23
Oct
2025

Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams

Cybersecurity researchers have uncovered a sophisticated campaign targeting global retail and consumer services organizations through credential theft and gift card…

Warlock Ransomware Exploits SharePoint ToolShell Zero-Day in New Attack Campaign
23
Oct
2025

Warlock Ransomware Exploits SharePoint ToolShell Zero-Day in New Attack Campaign

Chinese-linked threat actors behind the Warlock ransomware operation have emerged as a significant cybersecurity concern following their exploitation of a…