Category: GBHackers

New EtherHiding Technique Uses Web Attacks to Deploy Malware and Rotate Payloads
24
Nov
2025

New EtherHiding Technique Uses Web Attacks to Deploy Malware and Rotate Payloads

A new era of web-delivered malware has arrived with EtherHiding, a technique that fundamentally reshapes how attackers distribute and rotate…

Malicious PyPI Package Used by Hackers to Steal Users’ Crypto Information
24
Nov
2025

Malicious PyPI Package Used by Hackers to Steal Users’ Crypto Information

Cybersecurity researchers have uncovered a sophisticated supply-chain attack targeting Python developers through a malicious package distributed via the Python Package…

PoC Published for W3 Total Cache Flaw Exposing 1M+ Sites to RCE
24
Nov
2025

PoC Published for W3 Total Cache Flaw Exposing 1M+ Sites to RCE

Security researchers have published a proof-of-concept exploit for a critical remote code execution vulnerability in W3 Total Cache, one of…

Iberia Airlines Hit by Data Breach Exposing Customer Personal Details
24
Nov
2025

Iberia Airlines Hit by Data Breach Exposing Customer Personal Details

Iberia Líneas Aéreas de España has disclosed a significant security incident involving unauthorized access to systems operated by an external…

Linux 6.18-rc7 Released With New Bug Fixes and Driver Updates
24
Nov
2025

Linux 6.18-rc7 Released With New Bug Fixes and Driver Updates

The Linux kernel development team has released version 6.18-rc7, marking another step toward the final 6.18 release expected next weekend….

Zapier’s NPM Account Hacked, Multiple Packages Infected with Malware
24
Nov
2025

Zapier’s NPM Account Hacked, Multiple Packages Infected with Malware

Zapier’s NPM account has been successfully compromised, leading to the injection of the Shai Hulud malware into 425 packages currently…

LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuel the Development of Fully Autonomous Malware
24
Nov
2025

LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuel the Development of Fully Autonomous Malware

The rapid proliferation of large language models has transformed how organizations approach automation, coding, and research. Yet this technological advancement…

Tycoon2FA Launches Nearly 1 Million Attacks Targeting Office 365 Accounts
23
Nov
2025

Tycoon2FA Launches Nearly 1 Million Attacks Targeting Office 365 Accounts

Tycoon2FA, a sophisticated phishing-as-a-service platform tracked by Microsoft as Storm-1747, has emerged as the dominant threat targeting Office 365 accounts…

Metasploit Releases New Exploit for Fresh FortiWeb 0-Day Vulnerabilities
22
Nov
2025

Metasploit Releases New Exploit for Fresh FortiWeb 0-Day Vulnerabilities

Rapid7’s Metasploit team has released a new exploit module targeting critical zero-day vulnerabilities in Fortinet’s FortiWeb web application firewall, chaining…

CrowdStrike Fires Employee for Leaking Internal System Info to Hackers
22
Nov
2025

CrowdStrike Fires Employee for Leaking Internal System Info to Hackers

Cybersecurity giant CrowdStrike has terminated an employee who allegedly shared sensitive internal system information with a notorious hacking collective. The…

Hackers Use Salesforce Gainsight Breach to Access Data from More Than 200 Companies
22
Nov
2025

Hackers Use Salesforce Gainsight Breach to Access Data from More Than 200 Companies

Salesforce has disclosed a significant security incident involving unauthorized access to customer data through compromised Gainsight-published applications. The breach, detected…

CISA Issues Warning as Hackers Target Oracle Identity Manager RCE Flaw
22
Nov
2025

CISA Issues Warning as Hackers Target Oracle Identity Manager RCE Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a new Oracle vulnerability to its Known Exploited Vulnerabilities (KEV)…