Category: GBHackers

Threat Actors Exploiting MS-SQL Servers to Deploy XiebroC2 Framework
30
Sep
2025

Threat Actors Exploiting MS-SQL Servers to Deploy XiebroC2 Framework

A surge in attacks targeting improperly managed MS-SQL servers, culminating in the deployment of the open-source XiebroC2 command-and-control (C2) framework….

APT35 Hackers Targeting Government and Military to Steal Login Credentials
30
Sep
2025

APT35 Hackers Targeting Government and Military to Steal Login Credentials

Stormshield CTI researchers have identified two active phishing servers linked to APT35, revealing ongoing credential-stealing operations targeting government and military…

VMware Tools and Aria 0-Day Under Active Exploitation for Privilege Escalation
30
Sep
2025

VMware Tools and Aria 0-Day Under Active Exploitation for Privilege Escalation

Organizations using VMware hypervisors face an urgent threat as a local privilege escalation zero-day, tracked as CVE-2025-41244, is under active exploitation…

Veeam RCE Exploit Allegedly Listed for Sale on Dark Web
30
Sep
2025

Veeam RCE Exploit Allegedly Listed for Sale on Dark Web

A new dark web marketplace listing has sparked alarm in the cybersecurity community after a seller using the handle “SebastianPereiro”…

VMware vCenter and NSX Flaws Allow Hackers to Enumerate Usernames
30
Sep
2025

VMware vCenter and NSX Flaws Allow Hackers to Enumerate Usernames

Broadcom released VMSA-2025-0016 to address three key vulnerabilities affecting VMware vCenter Server and NSX products. The vulnerabilities include an SMTP…

New Harrods Data Breach Leaks Personal Information of 430,000 Customers
30
Sep
2025

New Harrods Data Breach Leaks Personal Information of 430,000 Customers

Luxury department store Harrods has become the latest victim of a significant cybersecurity incident after hackers successfully accessed personal data belonging to 430,000…

Hackers Distribute Malicious Microsoft Teams Build to Steal Remote Access
30
Sep
2025

Hackers Distribute Malicious Microsoft Teams Build to Steal Remote Access

Cybersecurity researchers have identified a sophisticated campaign where threat actors are using malicious advertisements and search engine optimization poisoning to…

A Windows Forensics Tool for DFIR Investigators
29
Sep
2025

A Windows Forensics Tool for DFIR Investigators

Forensic-Timeliner is a fast, open-source command-line tool designed to help digital forensics and incident response (DFIR) teams quickly build a…

Cybercriminals Target SonicWall Firewalls to Deploy Akira Ransomware via Malicious Login Attempts
29
Sep
2025

Cybercriminals Target SonicWall Firewalls to Deploy Akira Ransomware via Malicious Login Attempts

Security teams face a rapidly evolving campaign that abuses compromised SonicWall SSL VPN credentials to deliver Akira ransomware in under…

WhatsApp 0-Click Flaw Abused via Malicious DNG Image File
29
Sep
2025

WhatsApp 0-Click Flaw Abused via Malicious DNG Image File

A newly discovered zero-click remote code execution (RCE) vulnerability in WhatsApp is putting millions of Apple users at risk. Researchers from DarkNavyOrg…

New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials
29
Sep
2025

New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials

Adversaries don’t work 9–5 and neither do we. At eSentire, our 24/7 SOCs are staffed with elite threat hunters and…

New TamperedChef Malware Exploits Productivity Tools to Access and Exfiltrate Sensitive Data
29
Sep
2025

New TamperedChef Malware Exploits Productivity Tools to Access and Exfiltrate Sensitive Data

A sophisticated malware campaign dubbed “TamperedChef” is exploiting trojanized productivity tools—disguised as seemingly benign applications—to bypass security controls, establish persistence,…