Category: GBHackers

Threat Actors Exploiting Azure Blob Storage to Breach Organizational Repositories
22
Oct
2025

Threat Actors Exploiting Azure Blob Storage to Breach Organizational Repositories

Threat actors are increasingly targeting Azure Blob Storage, Microsoft’s flagship object storage solution, to infiltrate organizational repositories and disrupt critical…

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters
22
Oct
2025

Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters

Cybercriminals continue to evolve their email phishing arsenals, reviving legacy tactics while layering on advanced evasions to slip past automated…

Injecting Malicious Code into RMClient to Evade EDR
22
Oct
2025

Injecting Malicious Code into RMClient to Evade EDR

CyberProof researchers detected a significant surge in Remcos (Remote Control & Surveillance Software) campaigns throughout September and October 2025, exploiting…

SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion
22
Oct
2025

SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion

SharkStealer, a Golang-based information stealer, has been observed leveraging the Binance Smart Chain (BSC) Testnet as a covert dead-drop mechanism…

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data
22
Oct
2025

Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data

Cybercriminals are increasingly exploiting a legitimate Microsoft 365 feature designed for enterprise convenience, turning Exchange Online’s Direct Send into a…

Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data
22
Oct
2025

Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data

In a newly uncovered campaign, the threat group known as Bitter—also tracked as APT-Q-37—has leveraged both malicious Office macros and…

Direct Memory Attacks Used to Capture Browser Credentials
22
Oct
2025

Direct Memory Attacks Used to Capture Browser Credentials

On October 6, 2025, the cybercriminal developer known as “Loadbaks” announced the release of Vidar Stealer v2.0 on underground forums,…

New Rust Malware “ChaosBot” Hides Command-and-Control Inside Discord
22
Oct
2025

New Rust Malware “ChaosBot” Hides Command-and-Control Inside Discord

A sophisticated, Rust-based malware dubbed ChaosBot has been exposed utilizing the Discord platform for its Command and Control (C2) operations….

Millions of Credentials Stolen Each Day by Stealer Malware
22
Oct
2025

Millions of Credentials Stolen Each Day by Stealer Malware

The cybercrime ecosystem surrounding stealer malware has reached unprecedented scale, with threat actors now processing millions of stolen credentials daily…

New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading
22
Oct
2025

New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading

Salt Typhoon represents one of the most persistent and sophisticated cyber threats targeting global critical infrastructure today. Believed to be…

Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets
22
Oct
2025

Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets

Cloud account takeover attacks have evolved beyond simple credential theft. Cybercriminals are now exploiting OAuth applications to maintain persistent access…

Apache Syncope Groovy Flaw Allows Remote Code Injection
21
Oct
2025

Apache Syncope Groovy Flaw Allows Remote Code Injection

Apache Syncope, has disclosed a critical security vulnerability that allows authenticated administrators to execute arbitrary code on affected systems. The…