Category: GBHackers

Hackers Distribute Malicious Microsoft Teams Build to Steal Remote Access
30
Sep
2025

Hackers Distribute Malicious Microsoft Teams Build to Steal Remote Access

Cybersecurity researchers have identified a sophisticated campaign where threat actors are using malicious advertisements and search engine optimization poisoning to…

A Windows Forensics Tool for DFIR Investigators
29
Sep
2025

A Windows Forensics Tool for DFIR Investigators

Forensic-Timeliner is a fast, open-source command-line tool designed to help digital forensics and incident response (DFIR) teams quickly build a…

Cybercriminals Target SonicWall Firewalls to Deploy Akira Ransomware via Malicious Login Attempts
29
Sep
2025

Cybercriminals Target SonicWall Firewalls to Deploy Akira Ransomware via Malicious Login Attempts

Security teams face a rapidly evolving campaign that abuses compromised SonicWall SSL VPN credentials to deliver Akira ransomware in under…

WhatsApp 0-Click Flaw Abused via Malicious DNG Image File
29
Sep
2025

WhatsApp 0-Click Flaw Abused via Malicious DNG Image File

A newly discovered zero-click remote code execution (RCE) vulnerability in WhatsApp is putting millions of Apple users at risk. Researchers from DarkNavyOrg…

New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials
29
Sep
2025

New Spear-Phishing Attack Deploys DarkCloud Malware to Steal Keystrokes and Credentials

Adversaries don’t work 9–5 and neither do we. At eSentire, our 24/7 SOCs are staffed with elite threat hunters and…

New TamperedChef Malware Exploits Productivity Tools to Access and Exfiltrate Sensitive Data
29
Sep
2025

New TamperedChef Malware Exploits Productivity Tools to Access and Exfiltrate Sensitive Data

A sophisticated malware campaign dubbed “TamperedChef” is exploiting trojanized productivity tools—disguised as seemingly benign applications—to bypass security controls, establish persistence,…

Jaguar Land Rover Confirms Gradual Restart of Operations Post-Cyberattack
29
Sep
2025

Jaguar Land Rover Confirms Gradual Restart of Operations Post-Cyberattack

Jaguar Land Rover (JLR) has announced the controlled resumption of manufacturing operations following a significant cyberattack that disrupted its production…

Acreed Infostealer Gaining Popularity Among Cybercriminals for C2 via Steam Platform
29
Sep
2025

Acreed Infostealer Gaining Popularity Among Cybercriminals for C2 via Steam Platform

Acreed, a novel infostealer first observed in February 2025, has rapidly gained traction among threat actors seeking discreet credential and…

Hackers Exploit Weaponized Microsoft Teams Installer to Deploy Oyster Malware
29
Sep
2025

Hackers Exploit Weaponized Microsoft Teams Installer to Deploy Oyster Malware

A sophisticated malvertising campaign has been targeting organizations through a weaponized Microsoft Teams installer that delivers the dangerous Oyster malware,…

ThreatBook Unveils Advanced Threat Intelligence Solution for Modern Cybersecurity
29
Sep
2025

ThreatBook Unveils Advanced Threat Intelligence Solution for Modern Cybersecurity

Singapore, Singapore, September 29th, 2025, CyberNewsWire Analyzing over 14 billion cyber-attack records daily, ThreatBook ATI is a global solution enriched…

Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data
29
Sep
2025

Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data

Cybercriminals expand malvertising campaigns from Facebook to Google Ads and YouTube, hijacking accounts to distribute crypto-stealing malware targeting financial platform…

New Olymp Loader Malware-as-a-Service Promises Defender Bypass with Auto Certificate Signing
29
Sep
2025

New Olymp Loader Malware-as-a-Service Promises Defender Bypass with Auto Certificate Signing

Olymp Loader, a newly emerged Malware-as-a-Service (MaaS) offering, has rapidly gained traction across underground forums and Telegram since its debut…