Category: GBHackers

Threat Actors Exploiting Victims’ Machines for Bandwidth Monetization
21
Aug
2025

Threat Actors Exploiting Victims’ Machines for Bandwidth Monetization

Cybersecurity researchers have uncovered an ongoing campaign where threat actors exploit the critical CVE-2024-36401 vulnerability in GeoServer, a geospatial database,…

Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data
21
Aug
2025

Hackers Weaponize QR Codes With Malicious Links to Steal Sensitive Data

Quishing, a powerful form of phishing that uses malicious hyperlinks contained in QR codes to expose user credentials and sensitive…

Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
21
Aug
2025

Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies

Researchers have discovered a complex campaign using trojanized software that uses authentic code-signing certificates to avoid detection and turn compromised…

AI Website Generators Repurposed by Adversaries for Malware Campaigns
21
Aug
2025

AI Website Generators Repurposed by Adversaries for Malware Campaigns

Adversaries are using AI-powered website builders to expedite the development of harmful infrastructure in a quickly changing threat landscape, hence…

Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft
21
Aug
2025

Warlock Ransomware Exploits SharePoint Flaws for Initial Access and Credential Theft

The Warlock ransomware group has intensified its operations by targeting unpatched on-premises Microsoft SharePoint servers, leveraging critical vulnerabilities to achieve…

Threat Actors Abuse Internet Archive to Host Stealthy JScript Loader
21
Aug
2025

Threat Actors Abuse Internet Archive to Host Stealthy JScript Loader

An Malicious actors are using reliable internet resources, such as the Internet Archive, more frequently to disseminate clandestine malware components…

Paper Werewolf Exploits WinRAR Zero-Day Vulnerability to Deliver Malware
21
Aug
2025

Paper Werewolf Exploits WinRAR Zero-Day Vulnerability to Deliver Malware

Cyber spies associated with the threat actor group Paper Werewolf have demonstrated advanced capabilities in bypassing email security filters by…

MuddyWater APT Targets CFOs via OpenSSH; Enables RDP and Scheduled Tasks
21
Aug
2025

MuddyWater APT Targets CFOs via OpenSSH; Enables RDP and Scheduled Tasks

A sophisticated spear-phishing campaign attributed to the Iranian-linked APT group MuddyWater is actively compromising CFOs and finance executives across Europe,…

Kali Vagrant Rebuilt Released with Pre-Configured Command-Line VMs
21
Aug
2025

Kali Vagrant Rebuilt Released with Pre-Configured Command-Line VMs

Kali Linux has announced a major overhaul of its Vagrant virtual machine distribution system, transitioning from HashiCorp’s Packer to the…

FBI Warns Russian State Hackers Targeting Critical Infrastructure Networking Devices
21
Aug
2025

FBI Warns Russian State Hackers Targeting Critical Infrastructure Networking Devices

The Federal Bureau of Investigation (FBI) has issued a stark warning to the public, private sector, and international partners regarding…

Commvault Backup Suite Flaws Allow Attackers to Breach On-Premises Systems
21
Aug
2025

Commvault Backup Suite Flaws Allow Attackers to Breach On-Premises Systems

Security researchers have uncovered a critical series of vulnerabilities in Commvault’s backup and data management software that could enable attackers…

New SHAMOS Malware Targets macOS Through Fake Help Sites to Steal Login Credentials
21
Aug
2025

New SHAMOS Malware Targets macOS Through Fake Help Sites to Steal Login Credentials

Cybersecurity researchers at CrowdStrike identified and thwarted a sophisticated malware campaign deploying SHAMOS, an advanced variant of the Atomic macOS…