Category: GBHackers

Cybercriminals Exploit ICS Computers via Scripts and Phishing Attacks
22
Sep
2025

Cybercriminals Exploit ICS Computers via Scripts and Phishing Attacks

Industrial control systems (ICS) continue to face increasing cybersecurity challenges as threat actors employ sophisticated malicious scripts and phishing campaigns…

Hackers Abuse GitHub Pages to Spread Stealer Malware to macOS Users
22
Sep
2025

Hackers Abuse GitHub Pages to Spread Stealer Malware to macOS Users

A sophisticated malware campaign is targeting Mac users through fraudulent GitHub repositories that masquerade as legitimate software downloads, with threat…

Attackers Bypass Windows "Mark of the Web" Protections Using LNK-Stomping
22
Sep
2025

Attackers Bypass Windows “Mark of the Web” Protections Using LNK-Stomping

A sophisticated attack technique called LNK Stomping is enabling cybercriminals to bypass Windows security protections designed to block malicious files downloaded from…

Threat Actors Market Stealthy New RAT as Alternative to ScreenConnect FUD
22
Sep
2025

Threat Actors Market Stealthy New RAT as Alternative to ScreenConnect FUD

Cybersecurity researchers have identified a concerning development in the underground cybercrime marketplace: a sophisticated Remote Access Trojan (RAT) being marketed…

New GPT-4-Powered Malware That Writes Its Own Ransomware
22
Sep
2025

New GPT-4-Powered Malware That Writes Its Own Ransomware

A groundbreaking discovery in cybersecurity research has revealed the emergence of ‘MalTerminal’, potentially the earliest known example of Large Language Model…

New Botnet Exploits Simple DNS Flaws That Leads to Massive Cyber Attack
20
Sep
2025

New Botnet Exploits Simple DNS Flaws That Leads to Massive Cyber Attack

Cybersecurity researchers have uncovered a sophisticated Russian botnet operation that leveraged DNS misconfigurations and compromised MikroTik routers to deliver malware…

Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports
19
Sep
2025

Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports

New York, New York, September 19th, 2025, CyberNewsWire BreachLock, the global leader in offensive security, has been recognized as a…

New iOS Video Injection Tool Bypasses Biometric Locks on Jailbroken iPhones
19
Sep
2025

New iOS Video Injection Tool Bypasses Biometric Locks on Jailbroken iPhones

A newly discovered video injection tool for iOS devices that have been jailbroken poses a serious threat to modern digital…

Deceptive Tactics to Bypass Security Systems
19
Sep
2025

Deceptive Tactics to Bypass Security Systems

Since January, Trend Micro has tracked a surge in phishing campaigns using AI-powered platforms (Lovable, Netlify, Vercel) to host fake…

HubSpot’s Jinjava Engine Flaw Exposes Thousands of Sites to RCE Attacks
19
Sep
2025

HubSpot’s Jinjava Engine Flaw Exposes Thousands of Sites to RCE Attacks

A critical security vulnerability has been discovered in HubSpot’s Jinjava template engine, potentially exposing thousands of websites and applications to…

Nokia CBIS/NCS Manager API Vulnerability Allows Attackers to Bypass Authentication
19
Sep
2025

Nokia CBIS/NCS Manager API Vulnerability Allows Attackers to Bypass Authentication

On September 18, 2025, Orange Cert publicly disclosed a critical authentication bypass vulnerability affecting Nokia’s CBIS (CloudBand Infrastructure Software) and…

Luxury Jeweler Tiffany Reports Data Breach Exposing User Personal Data
19
Sep
2025

Luxury Jeweler Tiffany Reports Data Breach Exposing User Personal Data

Luxury jeweler Tiffany and Company has confirmed a data breach that exposed the personal information of 2,590 customers. The company discovered…