Category: GBHackers

Fake Google Play Store Websites Deliver Potent RAT to Steal Sensitive Data
25
Aug
2025

Fake Google Play Store Websites Deliver Potent RAT to Steal Sensitive Data

Cybersecurity researchers have uncovered a persistent campaign deploying the AndroidOS SpyNote malware, a sophisticated Remote Access Trojan (RAT) designed for…

Chinese APT Leverages Proxy and VPN Services to Obfuscate Infrastructure
25
Aug
2025

Chinese APT Leverages Proxy and VPN Services to Obfuscate Infrastructure

A significant data dump surfaced on DDoSecrets.com, purportedly extracted from a workstation belonging to a threat actor targeting organizations in…

Hackers Use AI-Generated Summaries to Deliver Ransomware Payloads
25
Aug
2025

Hackers Use AI-Generated Summaries to Deliver Ransomware Payloads

Cybercriminals have unveiled a novel variation of the ClickFix social engineering technique that weaponizes AI-powered summarization tools to stealthily distribute…

0-Click Zendesk Flaw Lets Hackers Hijack Accounts and View All Tickets
25
Aug
2025

0-Click Zendesk Flaw Lets Hackers Hijack Accounts and View All Tickets

A critical zero-click vulnerability in Zendesk’s Android SDK has been uncovered, enabling attackers to hijack support accounts and harvest every…

Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization - GBHackers Security
25
Aug
2025

Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization – GBHackers Security

Dover, DE, United States, August 25th, 2025, CyberNewsWire Attaxion announces the addition of the Agentless Traffic Monitoring capability to its exposure management platform….

Arch Linux Services Hit by Week-Long DDoS Attack
25
Aug
2025

Arch Linux Services Hit by Week-Long DDoS Attack

Arch Linux—the community-driven, lightweight distribution renowned for its rolling-release model—has confirmed that a distributed denial-of-service (DDoS) attack has been targeting…

Chinese Hacker Sentenced for Kill Switch Attack on Ohio Firm’s Global Network
25
Aug
2025

Chinese Hacker Sentenced for Kill Switch Attack on Ohio Firm’s Global Network

A federal court has handed down a four-year prison term to a former software developer who sabotaged his employer’s global…

Threat Actors Exploit Windows Scheduled Tasks for Stealthy Persistence Without Additional Tools
25
Aug
2025

Threat Actors Exploit Windows Scheduled Tasks for Stealthy Persistence Without Additional Tools

Threat actors continue to use Scheduled Tasks and other built-in Windows features to create persistence in the ever-changing world of…

Microsoft Confirms August 2025 Patch Slows Down Windows 11 24H2 and Windows 10
25
Aug
2025

Microsoft Confirms August 2025 Patch Slows Down Windows 11 24H2 and Windows 10

Microsoft has acknowledged that the August 2025 security update—KB5063878—can cause significant performance degradation on both Windows 11, version 24H2, and…

Hackers Abuse Python eval/exec Calls to Run Malicious Code
25
Aug
2025

Hackers Abuse Python eval/exec Calls to Run Malicious Code

Threat actors are increasingly abusing native evaluation and execution functions to conceal and execute malicious payloads within innocent-looking packages on…

New macOS Installer Boasts Lightning-Fast Data Theft, Marketed on Dark Web
25
Aug
2025

New macOS Installer Boasts Lightning-Fast Data Theft, Marketed on Dark Web

A novel macOS infostealer malware, designated as Mac.c, has emerged as a formidable contender in the underground malware-as-a-service (MaaS) ecosystem….

Hackers Exploit SendGrid to Steal User Login Credentials in Latest Attack
25
Aug
2025

Hackers Exploit SendGrid to Steal User Login Credentials in Latest Attack

Cybersecurity researchers at the Cofense Phishing Defense Center (PDC) have uncovered a fresh surge in credential harvesting attacks that leverage…