Category: GBHackers

Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks
06
Oct
2025

Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks

With the release of Kali Linux 2025.3, penetration testers and security professionals gain access to an innovative AI-powered assistant, the…

QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution
06
Oct
2025

QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution

QNAP Systems has disclosed a critical security vulnerability in its NetBak Replicator software that could enable local attackers to execute…

Yurei Ransomware leverages SMB shares and removable drives to Encrypt Files
06
Oct
2025

Yurei Ransomware leverages SMB shares and removable drives to Encrypt Files

Targeting Windows systems, Yurei employs advanced file encryption and stealth techniques to maximize impact and minimize detection. Encrypted files are…

06
Oct
2025

QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution

QNAP Systems has disclosed a critical security vulnerability in its NetBak Replicator software that could enable local attackers to execute…

Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code
06
Oct
2025

Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code

Cybercriminals have ramped up attacks on WordPress websites by stealthily modifying theme files to serve unauthorized third-party scripts. This campaign…

Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control
06
Oct
2025

Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control

Modern ransomware operations have evolved far beyond simple opportunistic attacks into sophisticated, multi-stage campaigns that exploit legitimate Remote Access Tools…

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution
06
Oct
2025

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution

A critical security vulnerability has been discovered in Redis Server that could allow authenticated attackers to achieve remote code execution…

Researchers Expose Its Antivirus Bypass Methods
06
Oct
2025

Researchers Expose Its Antivirus Bypass Methods

SpyCloud Labs analysts have successfully reverse-engineered Asgard Protector, a sophisticated crypter tool prominently used to hide malicious payloads from antivirus detection…

WARMCOOKIE Malware Operators Introduce Advanced Capabilities
06
Oct
2025

WARMCOOKIE Malware Operators Introduce Advanced Capabilities

The cybersecurity landscape continues to evolve as threat actors behind the WARMCOOKIE backdoor malware have significantly enhanced their capabilities, introducing…

New XWorm V6 Variant Embeds Malicious Code into Trusted Windows Applications
03
Oct
2025

New XWorm V6 Variant Embeds Malicious Code into Trusted Windows Applications

In the constantly evolving world of cyber threats, staying informed is not just an advantage; it’s a necessity. First observed…

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT
03
Oct
2025

Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT

In a recent wave of targeted phishing campaigns, the Cavalry Werewolf cluster has escalated its operations by impersonating government officials…

New Android Spyware Targeting Users by Imitating Signal and ToTok Apps
03
Oct
2025

New Android Spyware Targeting Users by Imitating Signal and ToTok Apps

ESET researchers have uncovered two sophisticated Android spyware campaigns that target users seeking secure communication platforms by impersonating popular messaging…