Category: GBHackers

New NFC-Based PhantomCard Malware Targets Android Banking Users
14
Aug
2025

New NFC-Based PhantomCard Malware Targets Android Banking Users

ThreatFabric analysts have uncovered PhantomCard, a sophisticated NFC-based Trojan designed to relay sensitive card data from victims’ devices to cybercriminals….

Threat Actors Use Advanced Tactics to Personalize Phishing for Malware Delivery
14
Aug
2025

Threat Actors Use Advanced Tactics to Personalize Phishing for Malware Delivery

Threat actors are using topic customization as a more advanced strategy in targeted malware-delivery phishing campaigns as the environment of…

Google Mandates License or Certification for Crypto App Developers
14
Aug
2025

Google Mandates License or Certification for Crypto App Developers

The cryptocurrency ecosystem is experiencing heightened scrutiny from both regulatory authorities and criminal organizations, as Google Play implements stringent publishing…

Qilin Ransomware Dominates July with Over 70 Claimed Victims
14
Aug
2025

Qilin Ransomware Dominates July with Over 70 Claimed Victims

The Qilin ransomware group has solidified its position as the most active threat actor in July 2025, marking its third…

'AI Induced Destruction' - How AI Misuse is Creating New Attack Vectors
14
Aug
2025

‘AI Induced Destruction’ – How AI Misuse is Creating New Attack Vectors

Cybersecurity firms are reporting a disturbing new trend in 2025: artificial intelligence assistants designed to boost productivity are inadvertently becoming…

Windows Out-of-Box-Experience Flaw Enables Full Administrative Command Prompt Access
14
Aug
2025

Windows Out-of-Box-Experience Flaw Enables Full Administrative Command Prompt Access

A newly documented vulnerability in Windows’ Out-of-Box-Experience (OOBE) allows users to bypass security restrictions and gain full administrative access to…

FireWood Malware Targets Linux Systems for Command Execution and Data Theft
14
Aug
2025

FireWood Malware Targets Linux Systems for Command Execution and Data Theft

Intezer’s Research Team has uncovered a new, low-detection variant of the FireWood backdoor, a sophisticated Linux-based remote access trojan (RAT)…

CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders
14
Aug
2025

CISA Publishes Operational Technology Guide for Critical Infrastructure Stakeholders

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with eight other national cyber agencies, has released a comprehensive “Foundations…

Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution
14
Aug
2025

Microsoft IIS Web Deploy Vulnerability Allows Remote Code Execution

Microsoft has disclosed a critical security vulnerability in its Internet Information Services (IIS) Web Deploy tool that could allow attackers…

EncryptHub Turns Brave Support Into a Dropper; MMC Flaw Completes the Run
14
Aug
2025

EncryptHub Turns Brave Support Into a Dropper; MMC Flaw Completes the Run

Trustwave SpiderLabs researchers have uncovered a sophisticated EncryptHub campaign that ingeniously abuses the Brave Support platform to deliver malicious payloads,…

Splunk Publishes Defender’s Guide to Spot ESXi Ransomware Early
14
Aug
2025

Splunk Publishes Defender’s Guide to Spot ESXi Ransomware Early

Splunk has released a comprehensive defender’s guide aimed at helping cybersecurity teams detect and prevent ransomware attacks targeting ESXi infrastructure…

Attackers Need Just One Vulnerability to Own Your Rooted Android
14
Aug
2025

Attackers Need Just One Vulnerability to Own Your Rooted Android

Android privilege escalation has been transformed by rooting frameworks such as KernelSU, APatch, and SKRoot, which use advanced kernel patching…