Category: GBHackers

Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms
01
Oct
2025

Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms

JFrog’s security research team has identified a malicious PyPI package named SoopSocks that masquerades as a legitimate SOCKS5 proxy utility…

Senior Travel Scams Used by Threat Actors to Distribute Datzbro Malware
01
Oct
2025

Senior Travel Scams Used by Threat Actors to Distribute Datzbro Malware

In August 2025, Australian authorities issued multiple scam alerts after users reported suspicious Facebook groups promoting “active senior trips.” What…

01
Oct
2025

Senior Travel Scams Used by Threat Actors to Distribute Datzbro Malware

In August 2025, Australian authorities issued multiple scam alerts after users reported suspicious Facebook groups promoting “active senior trips.” What…

Chinese State-Sponsored Hackers Exploiting Network Edge Devices to Harvest Sensitive Data
01
Oct
2025

Chinese State-Sponsored Hackers Exploiting Network Edge Devices to Harvest Sensitive Data

Chinese state-sponsored cyber threat group Salt Typhoon has been targeting global telecommunications infrastructure since at least 2019, exploiting network edge…

Ukraine Warns of Weaponized XLL Files Delivering CABINETRAT Malware via Zip Archives
01
Oct
2025

Ukraine Warns of Weaponized XLL Files Delivering CABINETRAT Malware via Zip Archives

Ukraine’s national cyber incident response team, CERT-UA, has issued an urgent warning about a new malware campaign that weaponizes Excel…

New FlipSwitch Hooking Method Overcomes Linux Kernel Defenses
01
Oct
2025

New FlipSwitch Hooking Method Overcomes Linux Kernel Defenses

A novel rootkit hooking method dubbed FlipSwitch has emerged, circumventing the latest Linux 6.9 kernel dispatch safeguards and reigniting concerns…

New DNS Malware 'Detour Dog' Uses TXT Records to Deliver Strela Stealer
01
Oct
2025

New DNS Malware ‘Detour Dog’ Uses TXT Records to Deliver Strela Stealer

Detour Dog, a stealthy website malware campaign tracked since August 2023, has evolved from redirecting victims to tech-support scams into…

Battering RAM Exploit Bypasses Modern Protections in Intel, AMD Cloud Processors
01
Oct
2025

Battering RAM Exploit Bypasses Modern Protections in Intel, AMD Cloud Processors

Cloud providers rely on hardware-based memory encryption to keep user data safe. This encryption shields sensitive information like passwords, financial…

Red Hat OpenShift AI Vulnerability Lets Attackers Seize Infrastructure Control
01
Oct
2025

Red Hat OpenShift AI Vulnerability Lets Attackers Seize Infrastructure Control

A serious vulnerability in the Red Hat OpenShift AI service (RHOAI) enables attackers with minimal access to escalate privileges and…

Google Publishes Security Hardening Guide to Counter UNC6040 Threats
01
Oct
2025

Google Publishes Security Hardening Guide to Counter UNC6040 Threats

Google’s Threat Intelligence Group (GTIG) has published a comprehensive guide to help organizations strengthen their SaaS security posture—particularly Salesforce—against UC6040’s…

Cisco IOS/IOS XE SNMP Vulnerabilities Exploited in Ongoing Attacks, Warns CISA
01
Oct
2025

Cisco IOS/IOS XE SNMP Vulnerabilities Exploited in Ongoing Attacks, Warns CISA

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about critical vulnerabilities in Cisco’s IOS and IOS XE…

Microsoft Sentinel Launches AI-Driven Agentic SIEM Platform for Enterprise Security
01
Oct
2025

Microsoft Sentinel Launches AI-Driven Agentic SIEM Platform for Enterprise Security

Organizations face an ever-evolving cyberthreat landscape marked by faster, more complex attacks. Today, Microsoft is answering this call with the…