Category: GBHackers

Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks
11
Feb
2025

Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks

Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks. According to the whoisxmlapi shared on…

Akira Ransomware Dominates January 2025 as the Most Active Ransomware Threat
11
Feb
2025

Akira Ransomware Dominates January 2025 as the Most Active Ransomware Threat

January 2025 marked a pivotal month in the ransomware landscape, with Akira emerging as the most active and dominant threat…

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures
11
Feb
2025

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures

Recent research has highlighted the increasingly sophisticated tactics, techniques, and procedures (TTPs) employed by North Korean state-sponsored hackers. These cyber…

Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices
11
Feb
2025

Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices

Innovative tools are continually appearing to enhance the capabilities of professionals and enthusiasts alike. One new entrant into the world…

FinStealer Malware Targets Leading Indian Bank's Mobile Users, Stealing Login Credentials
11
Feb
2025

FinStealer Malware Targets Leading Indian Bank’s Mobile Users, Stealing Login Credentials

A new cybersecurity threat has emerged, targeting customers of a prominent Indian bank through fraudulent mobile applications. Dubbed “FinStealer,” this…

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft
11
Feb
2025

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

A newly discovered phishing campaign targeting Facebook users has been identified by researchers at Check Point Software Technologies. The attack,…

DeepSeek Accused of Over-Collecting Personal Data, Says South Korea’s Spy Agency
11
Feb
2025

DeepSeek Accused of Over-Collecting Personal Data, Says South Korea’s Spy Agency

South Korea’s National Intelligence Service (NIS) has raised alarms over the Chinese artificial intelligence app, DeepSeek, accusing it of “excessively”…

Critical Flaw in Progress LoadMaster Allows Attackers to Execute System Commands
11
Feb
2025

Critical Flaw in Progress LoadMaster Allows Attackers to Execute System Commands

 A series of critical security vulnerabilities have been identified in Progress Software’s LoadMaster application, potentially allowing remote attackers to execute…

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators
11
Feb
2025

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their alleged involvement in ransomware operations that…

12,000+ KerioControl Firewalls Exposed to 1-Click RCE Attack"
11
Feb
2025

12,000+ KerioControl Firewalls Exposed to 1-Click RCE Attack”

Cybersecurity researchers caution that over 12,000 instances of GFI KerioControl firewalls remain unpatched and vulnerable to a critical security flaw…

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack
11
Feb
2025

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has been actively exploited in targeted attacks…

Hackers Exploiting Google Tag Managers to Steal Credit Card from eCommerce Sites
11
Feb
2025

Hackers Exploiting Google Tag Managers to Steal Credit Card from eCommerce Sites

In a concerning development, cybercriminals are leveraging Google Tag Manager (GTM), a legitimate tool widely used by eCommerce websites, to…