Category: GBHackers

New ‘Fully Undetectable’ Android RAT Discovered on GitHub
06
Oct
2025

New ‘Fully Undetectable’ Android RAT Discovered on GitHub

Hosted at the repository “Huckel789/Android-RAT,” this fully undetectable (FUD) RAT is designed to evade antivirus detection permanently, maintain persistence in…

Hackers Allegedly Breach Huawei Technologies, Leak Source Code and Internal Tools
06
Oct
2025

Hackers Allegedly Breach Huawei Technologies, Leak Source Code and Internal Tools

Cybersecurity researchers are reporting an alleged security breach involving Chinese technology giant Huawei Technologies, with hackers claiming to have accessed and…

TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors
06
Oct
2025

TamperedChef Malware Disguised as PDF Editor Hijacks Browser Credentials and Opens Backdoors

A sophisticated malware campaign dubbed TamperedChef has successfully compromised European organizations by masquerading as a legitimate PDF editor application, according…

Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks
06
Oct
2025

Integrate Gemini CLI into Your Kali Terminal to Speed Up Pentesting Tasks

With the release of Kali Linux 2025.3, penetration testers and security professionals gain access to an innovative AI-powered assistant, the…

QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution
06
Oct
2025

QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution

QNAP Systems has disclosed a critical security vulnerability in its NetBak Replicator software that could enable local attackers to execute…

Yurei Ransomware leverages SMB shares and removable drives to Encrypt Files
06
Oct
2025

Yurei Ransomware leverages SMB shares and removable drives to Encrypt Files

Targeting Windows systems, Yurei employs advanced file encryption and stealth techniques to maximize impact and minimize detection. Encrypted files are…

06
Oct
2025

QNAP NetBak Replicator Vulnerability Allow Malicious Code Execution

QNAP Systems has disclosed a critical security vulnerability in its NetBak Replicator software that could enable local attackers to execute…

Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code
06
Oct
2025

Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code

Cybercriminals have ramped up attacks on WordPress websites by stealthily modifying theme files to serve unauthorized third-party scripts. This campaign…

Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control
06
Oct
2025

Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control

Modern ransomware operations have evolved far beyond simple opportunistic attacks into sophisticated, multi-stage campaigns that exploit legitimate Remote Access Tools…

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution
06
Oct
2025

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution

A critical security vulnerability has been discovered in Redis Server that could allow authenticated attackers to achieve remote code execution…

Researchers Expose Its Antivirus Bypass Methods
06
Oct
2025

Researchers Expose Its Antivirus Bypass Methods

SpyCloud Labs analysts have successfully reverse-engineered Asgard Protector, a sophisticated crypter tool prominently used to hide malicious payloads from antivirus detection…

WARMCOOKIE Malware Operators Introduce Advanced Capabilities
06
Oct
2025

WARMCOOKIE Malware Operators Introduce Advanced Capabilities

The cybersecurity landscape continues to evolve as threat actors behind the WARMCOOKIE backdoor malware have significantly enhanced their capabilities, introducing…