Category: GBHackers

MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems
09
Sep
2025

MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems

Cybersecurity researchers at FortiGuard Labs have uncovered a sophisticated phishing campaign that deploys the MostereRAT remote access trojan to compromise…

APT37 Deploys New Rust and Python Malware Targeting Windows Systems
09
Sep
2025

APT37 Deploys New Rust and Python Malware Targeting Windows Systems

The North Korean-aligned threat group APT37, also known as ScarCruft, Ruby Sleet, and Velvet Chollima, has evolved its cyber warfare…

Chinese Hackers Salt Typhoon and UNC4841 Team Up to Breach Critical Infrastructure
09
Sep
2025

Chinese Hackers Salt Typhoon and UNC4841 Team Up to Breach Critical Infrastructure

Cybersecurity researchers at Silent Push have uncovered a sophisticated Chinese espionage operation linking two prominent threat actors, Salt Typhoon and…

Hackers Hijack 18 Popular npm Packages Downloaded Over 2 Billion Times Weekly
09
Sep
2025

Hackers Hijack 18 Popular npm Packages Downloaded Over 2 Billion Times Weekly

Hackers have hijacked 18 extremely popular npm packages, downloaded more than 2 billion times every week, injecting them with sophisticated…

Qualys Confirms Cyberattack Campaign Targeting Salesforce via Salesloft and Drift
09
Sep
2025

Qualys Confirms Cyberattack Campaign Targeting Salesforce via Salesloft and Drift

Qualys has confirmed that it was recently impacted by a cybersecurity campaign targeting Salesloft and Drift, two third-party SaaS platforms…

Apache Jackrabbit Vulnrability Exposes Systems to Remote Code Execution Attacks
08
Sep
2025

Apache Jackrabbit Vulnrability Exposes Systems to Remote Code Execution Attacks

A new security flaw has been discovered in Apache Jackrabbit, a widely used content repository system, potentially exposing thousands of…

LunaLock Ransomware Attacking Artists to Steal and Encrypt Data
08
Sep
2025

LunaLock Ransomware Attacking Artists to Steal and Encrypt Data

LunaLock, a newly surfaced ransomware strain, has launched a targeted campaign against independent artists and their clients, demanding a hefty…

Kimsuky Hackers’ Playbook Uncovered in Exposed ‘Kim’ Data Dump
08
Sep
2025

Kimsuky Hackers’ Playbook Uncovered in Exposed ‘Kim’ Data Dump

A rare breach attributed to a North Korean–affiliated actor named “Kim” by the leakers has unveiled unprecedented insight into Kimsuky…

Hackers Exploit Amazon SES to Blast Over 50,000 Malicious Emails Daily
08
Sep
2025

Hackers Exploit Amazon SES to Blast Over 50,000 Malicious Emails Daily

A sophisticated cyberattack campaign where threat actors exploited compromised AWS credentials to hijack Amazon’s Simple Email Service (SES), launching large-scale…

Web Application Firewall Bypassed via JS Injection with Parameter Pollution
08
Sep
2025

Web Application Firewall Bypassed via JS Injection with Parameter Pollution

In a recent autonomous penetration test, a novel cross-site scripting (XSS) bypass that sidesteps even highly restrictive Web Application Firewalls…

PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access
08
Sep
2025

PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access

A newly disclosed security flaw in pgAdmin4, the widely used open-source tool for managing PostgreSQL databases, has raised serious concerns among…

How Microsoft Azure Storage Logs Help Investigate Security Breaches
08
Sep
2025

How Microsoft Azure Storage Logs Help Investigate Security Breaches

When a security breach occurs, vital evidence often appears in unexpected places. One such source is Microsoft Azure Storage logs, which…