Category: GBHackers

North Korean Hackers Exploit EtherHiding to Spread Malware and Steal Crypto Assets
17
Oct
2025

North Korean Hackers Exploit EtherHiding to Spread Malware and Steal Crypto Assets

The cybersecurity landscape has witnessed a significant evolution in attack techniques with North Korean threat actors adopting EtherHiding, a sophisticated…

New Phishing Technique Targets Users via Basic Auth URLs
16
Oct
2025

New Phishing Technique Targets Users via Basic Auth URLs

Netcraft recently uncovered a suspicious URL targeting GMO Aozora Bank, a Japanese financial institution. The URL leveraged a legacy web…

Hackers Infiltrate Organization to Steal Sensitive Data
16
Oct
2025

Hackers Infiltrate Organization to Steal Sensitive Data

In a recently uncovered campaign, the Mysterious Elephant advanced persistent threat (APT) group has executed a sophisticated series of intrusions…

Capita Fined £14 Million After Data Breach Exposes 6.6 Million Users
16
Oct
2025

Capita Fined £14 Million After Data Breach Exposes 6.6 Million Users

The UK’s Information Commissioner’s Office has imposed a £14 million penalty on Capita following a major cyber attack in March…

Weaponizing Windows Scheduled Tasks for ValleyRAT Delivery
16
Oct
2025

Weaponizing Windows Scheduled Tasks for ValleyRAT Delivery

A targeted cyber-espionage campaign exploiting Windows Scheduled Tasks and DLL side-loading to deploy the sophisticated ValleyRAT backdoor. The operation pivots…

North Korean Hackers Deploy BeaverTail–OtterCookie Combo for Keylogging Attacks
16
Oct
2025

North Korean Hackers Deploy BeaverTail–OtterCookie Combo for Keylogging Attacks

Researchers at Cisco Talos have uncovered a sophisticated campaign by the Famous Chollima subgroup of Lazarus, wherein attackers deploy blended…

Fake ‘LastPass Hack’ Emails Spreading Malware
16
Oct
2025

Fake ‘LastPass Hack’ Emails Spreading Malware

A new phishing campaign impersonating LastPass is circulating today, October 13, 2025, aiming to deceive users into downloading malicious desktop…

CISA Alerts on Actively Exploited Windows Improper Access Control Flaw
16
Oct
2025

CISA Alerts on Actively Exploited Windows Improper Access Control Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding an actively exploited vulnerability in Microsoft Windows….

Qilin Ransomware Leverages Ghost Bulletproof Hosting for Global Attacks
16
Oct
2025

Qilin Ransomware Leverages Ghost Bulletproof Hosting for Global Attacks

Qilin ransomware–an increasingly prolific ransomware-as-a-service (RaaS) operation–has intensified its global extortion campaigns by exploiting a covert network of bulletproof hosting…

Critical Samba Flaw Allows Remote Attackers to Execute Arbitrary Code
16
Oct
2025

Critical Samba Flaw Allows Remote Attackers to Execute Arbitrary Code

A newly disclosed vulnerability in Samba’s WINS server hook script enables unauthenticated attackers to run arbitrary commands on affected domain…

Critical Apache ActiveMQ Flaw Allows Attackers to Execute Arbitrary Code
16
Oct
2025

Critical Apache ActiveMQ Flaw Allows Attackers to Execute Arbitrary Code

An important security flaw in Apache ActiveMQ’s .NET client library has put developers at risk of remote code execution. The…

CISA Alerts on Adobe Experience Manager Flaw Exploited for Code Execution
16
Oct
2025

CISA Alerts on Adobe Experience Manager Flaw Exploited for Code Execution

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Adobe Experience Manager Forms vulnerability to its Known Exploited…