Category: GBHackers

TAG-150 Hackers Escalate Attacks with Proprietary Malware Families
05
Sep
2025

TAG-150 Hackers Escalate Attacks with Proprietary Malware Families

A sophisticated threat actor, TAG-150, active since at least March 2025. Characterized by rapid malware development, technical sophistication, and a…

TP-Link Vulnerabilities Under Active Exploitation
05
Sep
2025

TP-Link Vulnerabilities Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding critical vulnerabilities in popular TP-Link router models…

Colombian Malware Exploits SWF and SVG to Evade Detection
05
Sep
2025

Colombian Malware Exploits SWF and SVG to Evade Detection

A sophisticated malware campaign targeting Colombian institutions through an unexpected vector: weaponized SWF and SVG files that successfully evade traditional…

New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto
05
Sep
2025

New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto

A sophisticated cryptojacking campaign that hijacks Windows’ native Character Map utility (“charmap.exe”) to evade Windows Defender and covertly mine cryptocurrency…

North Korean Hackers Expose Their Playbook for Swapping Infrastructure
05
Sep
2025

North Korean Hackers Expose Their Playbook for Swapping Infrastructure

A sophisticated North Korean cyber operation has been exposed, revealing how state-sponsored hackers systematically monitor cybersecurity intelligence platforms to detect…

Hackers Exploit Google Calendar API with Serverless MeetC2 Framework
05
Sep
2025

Hackers Exploit Google Calendar API with Serverless MeetC2 Framework

A novel serverless command-and-control (C2) technique that abuses Google Calendar APIs to obscure malicious traffic inside trusted cloud services. Dubbed…

Windows Heap Buffer Overflow Vulnerability Allows Attackers to Gain Elevated Privileges
05
Sep
2025

Windows Heap Buffer Overflow Vulnerability Allows Attackers to Gain Elevated Privileges

A critical security vulnerability has been discovered in Microsoft Windows systems that allows attackers to escalate their privileges and potentially…

Hackers Exploit Raw Disk Reads to Evade EDR and Steal Sensitive Files
05
Sep
2025

Hackers Exploit Raw Disk Reads to Evade EDR and Steal Sensitive Files

Attackers can bypass Endpoint Detection and Response (EDR) tools and file locks by reading raw disk sectors directly, highlighting the…

NightshadeC2 Botnet Exploits ‘UAC Prompt Bombing’ to Evade Windows Defender
05
Sep
2025

NightshadeC2 Botnet Exploits ‘UAC Prompt Bombing’ to Evade Windows Defender

A sophisticated new botnet called NightshadeC2 that employs an innovative “UAC Prompt Bombing” technique to evade Windows Defender and compromise…

Hackers Target Cisco ASA Devices in Massive Scan Across 25,000 IPs
05
Sep
2025

Hackers Target Cisco ASA Devices in Massive Scan Across 25,000 IPs

Security researchers have detected massive scanning campaigns targeting Cisco Adaptive Security Appliance (ASA) devices, with attackers probing over 25,000 unique…

Iran-Nexus Hackers Impersonate Omani MFA to Target Governments Entities
04
Sep
2025

Iran-Nexus Hackers Impersonate Omani MFA to Target Governments Entities

Cybersecurity researchers uncovered a sophisticated, Iran-linked spear-phishing operation that exploited a compromised Ministry of Foreign Affairs (MFA) mailbox in Oman…

Sendmarc appoints Rob Bowker as North American Region Lead
04
Sep
2025

Sendmarc appoints Rob Bowker as North American Region Lead

Wilmington, United States, September4th, 2025, CyberNewsWire: Veteran email security leader to expand MSP and VAR partnerships and accelerate DMARC adoption. …