Category: GBHackers

Threat Actors Exploit Telegram as the Communication Channel to Exfiltrate Stolen Data
18
Aug
2025

Threat Actors Exploit Telegram as the Communication Channel to Exfiltrate Stolen Data

tLab Technologies, a Kazakhstan-based company that specializes in advanced threat prevention, discovered one of the first known phishing attempts in…

Technical Details of SAP 0-Day Exploitation Script for RCE Revealed
18
Aug
2025

Technical Details of SAP 0-Day Exploitation Script for RCE Revealed

Cybersecurity researchers have unveiled the inner workings of an exploit script targeting a critical zero-day vulnerability in SAP NetWeaver’s Visual…

Linux Kernel Netfilter Flaw Enables Privilege Escalation
18
Aug
2025

Linux Kernel Netfilter Flaw Enables Privilege Escalation

A critical vulnerability in the Linux kernel’s netfilter subsystem has been discovered that allows local attackers to escalate privileges through…

DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group
18
Aug
2025

DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group

The Department of Justice has announced a significant victory against cybercriminals, seizing over $2.8 million in cryptocurrency and additional assets…

Bragg Confirms Cyberattack, Internal IT Systems Breached
18
Aug
2025

Bragg Confirms Cyberattack, Internal IT Systems Breached

Bragg Gaming Group (NASDAQ: BRAG, TSX: BRAG), a prominent content and technology provider in the online gaming industry, has disclosed…

New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards
18
Aug
2025

New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards

Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution…

North Korean Hackers’ Secret Linux Malware Surfaces Online
18
Aug
2025

North Korean Hackers’ Secret Linux Malware Surfaces Online

Phrack Magazine’s latest issue #72 has unveiled a significant data leak from a suspected North Korean hacking operation, including exploit…

Workday Data Breach Exposes HR Records via Third-Party CRM Hack
18
Aug
2025

Workday Data Breach Exposes HR Records via Third-Party CRM Hack

Enterprise software giant Workday has disclosed a security incident involving unauthorized access to employee information through a compromised third-party customer…

How LLMs Revive Classic Cyber Threats
18
Aug
2025

How LLMs Revive Classic Cyber Threats

In an era where users rely on vigilance against shady websites and file hashing via platforms like VirusTotal, a new…

Scammers Target Back-to-School Deals, Diverting Shoppers to Fraud Sites
18
Aug
2025

Scammers Target Back-to-School Deals, Diverting Shoppers to Fraud Sites

As the back-to-school season intensifies, cybercriminals are exploiting the heightened online shopping activity by deploying sophisticated scams aimed at siphoning…

Hundreds of TeslaMate Servers Expose Real-Time Vehicle Data
18
Aug
2025

Hundreds of TeslaMate Servers Expose Real-Time Vehicle Data

A security researcher has discovered that hundreds of self-hosted TeslaMate servers are exposing sensitive Tesla vehicle data to the public…

Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution
18
Aug
2025

Rockwell ControlLogix Ethernet Vulnerability Exposes Systems to Remote Code Execution

A critical vulnerability in Rockwell Automation’s ControlLogix Ethernet modules has been discovered that could allow remote attackers to execute malicious…