Category: GBHackers

Over 3,000 Infected Videos Target Users
24
Oct
2025

Over 3,000 Infected Videos Target Users

Check Point Research has uncovered a massive malware distribution operation called the YouTube Ghost Network, featuring over 3,000 malicious videos…

Hackers Exploit Galaxy S25 0-Day to Turn On Camera and Track Users
24
Oct
2025

Hackers Exploit Galaxy S25 0-Day to Turn On Camera and Track Users

A critical zero-day vulnerability in Samsung’s flagship Galaxy S25 smartphone was successfully exploited at Pwn2Own Ireland 2025, demonstrating how attackers…

Hackers Steal Microsoft Teams Chats & Emails by Grabbing Access Tokens
24
Oct
2025

Hackers Steal Microsoft Teams Chats & Emails by Grabbing Access Tokens

Security researchers have discovered a sophisticated method that allows attackers to steal access tokens from Microsoft Teams, potentially granting unauthorized…

Ransomware Actors Target VMware Deployments
24
Oct
2025

Ransomware Actors Target VMware Deployments

The Agenda ransomware group has evolved its attack methodology with a sophisticated technique that deploys Linux ransomware variants directly on…

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars - GBHackers Security
24
Oct
2025

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars – GBHackers Security

SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious…

TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT
23
Oct
2025

TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT

In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and…

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process
23
Oct
2025

Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process

Atlassian has disclosed a critical path traversal vulnerability affecting Jira Software Data Center and Server that could allow authenticated attackers…

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion
23
Oct
2025

Stealthy Malware Leveraging Variable Functions and Cookies for Evasion

Cybersecurity researchers at Wordfence Threat Intelligence and their Care and Response teams have observed a persistent trend in new malware…

Global SMS Phishing Campaign Traced to China Targets Users Worldwide
23
Oct
2025

Global SMS Phishing Campaign Traced to China Targets Users Worldwide

A sophisticated and widespread smishing campaign originating from China has emerged as a significant threat to users worldwide. Researchers have…

Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography
23
Oct
2025

Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Cybersecurity researchers at Arctic Wolf Labs have uncovered a cunning new threat dubbed Caminho, a Brazilian Loader-as-a-Service (LaaS) that’s turning…

Vulnerability in Perplexity’s Comet Browser Screenshot Feature Allows Malicious Prompt Injection
23
Oct
2025

Vulnerability in Perplexity’s Comet Browser Screenshot Feature Allows Malicious Prompt Injection

Researchers have discovered a critical security vulnerability in Perplexity’s Comet AI browser that allows attackers to inject malicious commands through…

Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers
23
Oct
2025

Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers

Scammers have intensified their efforts to defraud vulnerable populations through sophisticated impersonation schemes and fraudulent financial aid offers, according to…