Category: GBHackers

706,000+ BIND 9 DNS Resolvers Exposed to Cache Poisoning
27
Oct
2025

706,000+ BIND 9 DNS Resolvers Exposed to Cache Poisoning

A critical vulnerability affecting more than 706,000 BIND 9 DNS resolvers worldwide has been disclosed with proof-of-concept exploit code now…

Hackers Use ClickFix Technique to Deploy NetSupport RAT Loaders
25
Oct
2025

Hackers Use ClickFix Technique to Deploy NetSupport RAT Loaders

Cybercriminals are increasingly using a technique known as “ClickFix” to deploy the NetSupport remote administration tool (RAT) for malicious purposes….

Hackers Exploit WordPress Arbitrary Installation Vulnerabilities in the Wild
25
Oct
2025

Hackers Exploit WordPress Arbitrary Installation Vulnerabilities in the Wild

Cybersecurity firm Wordfence has uncovered a renewed wave of mass exploitation targeting critical vulnerabilities in two popular WordPress plugins, allowing…

CISA Beware! Hackers Are Actively Exploiting Windows Server Update Services RCE Flaw in the Wild
25
Oct
2025

CISA Beware! Hackers Are Actively Exploiting Windows Server Update Services RCE Flaw in the Wild

Cybersecurity researchers are sounding the alarm after discovering that hackers are actively exploiting a critical remote code execution (RCE) vulnerability…

New RedTiger Tool Targets Gamers and Discord Accounts in the Wild
24
Oct
2025

New RedTiger Tool Targets Gamers and Discord Accounts in the Wild

Gamers face a growing threat from cybercriminals exploiting popular gaming and communication platforms. A dangerous infostealer called RedTiger is now…

Google Warns of Cybercriminals Using Fake Job Postings to Spread Malware and Steal Credentials
24
Oct
2025

Google Warns of Cybercriminals Using Fake Job Postings to Spread Malware and Steal Credentials

Google’s Threat Intelligence Group (GTIG) has uncovered a sophisticated social engineering campaign orchestrated by financially motivated threat actors based in…

LockBit 5.0 Targets Windows, Linux, and ESXi Systems in Ongoing Attacks
24
Oct
2025

LockBit 5.0 Targets Windows, Linux, and ESXi Systems in Ongoing Attacks

After months of disruption following Operation Cronos in early 2024, the notorious LockBit ransomware group has resurfaced with renewed vigor…

Amazon Reveals Technical Fault Behind Widescale AWS Service Outage
24
Oct
2025

Amazon Reveals Technical Fault Behind Widescale AWS Service Outage

Amazon Web Services experienced a major outage that affected millions of customers and Amazon’s own operations on October 19 and…

Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats
24
Oct
2025

Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats

Paris, France, October 24th, 2025, CyberNewsWire Arsen, the cybersecurity company dedicated to helping organizations defend against social engineering, today introduced…

Telegram Messenger Abused by Android Malware to Seize Full Device Control
24
Oct
2025

Telegram Messenger Abused by Android Malware to Seize Full Device Control

Security researchers at Doctor Web have uncovered a sophisticated Android backdoor disguised as Telegram X that grants cybercriminals complete control…

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
24
Oct
2025

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program

A major cybersecurity investigation has uncovered a sophisticated criminal operation called Vault Viper that exploits online gambling platforms to distribute…

New PDF Tool Detects Malicious Files Using PDF Object Hashing
24
Oct
2025

New PDF Tool Detects Malicious Files Using PDF Object Hashing

Proofpoint has released a new open-source tool called PDF Object Hashing that helps security teams detect and track malicious files…