Category: GBHackers

Google Play Flooded With 224 Malicious Apps, 38 Million Downloads Deliver Malware
17
Sep
2025

Google Play Flooded With 224 Malicious Apps, 38 Million Downloads Deliver Malware

A global ad fraud and click fraud operation, dubbed SlopAds, comprising 224 Android apps that collectively amassed more than 38…

New Magecart Attack Injects Malicious JavaScript to Steal Payment Data
17
Sep
2025

New Magecart Attack Injects Malicious JavaScript to Steal Payment Data

A new Magecart-style campaign has emerged that leverages malicious JavaScript injections to skim payment data from online checkout forms. The…

China-Aligned TA415 Exploits Google Sheets & Calendar for C2
17
Sep
2025

China-Aligned TA415 Exploits Google Sheets & Calendar for C2

China-aligned TA415 hackers have adopted Google Sheets and Google Calendar as covert command-and-control (C2) channels in a sustained espionage campaign…

Agentless Access, Sensitive Data Masking, and Smooth Session Playback
17
Sep
2025

Agentless Access, Sensitive Data Masking, and Smooth Session Playback

Syteca, a global cybersecurity provider, introduced the latest release of its platform, continuing the mission to help organizations reduce insider…

17
Sep
2025

Agentless Access, Sensitive Data Masking, and Smooth Session Playback

Syteca, a global cybersecurity provider, introduced the latest release of its platform, continuing the mission to help organizations reduce insider…

BeaverTail Malware Delivered Through Malicious Repositories Targets Retailers
17
Sep
2025

BeaverTail Malware Delivered Through Malicious Repositories Targets Retailers

Tech Note – BeaverTail variant distributed via malicious repositories and ClickFix lure17 September 2025 – Oliver Smith, GitLab Threat Intelligence…

Microsoft OneDrive Auto-Sync Flaw Leaks Enterprise Secrets from SharePoint Online
17
Sep
2025

Microsoft OneDrive Auto-Sync Flaw Leaks Enterprise Secrets from SharePoint Online

A new report from Entro Labs reveals that one in five exposed secrets in large organizations can be traced back…

MuddyWater Deploys Custom Multi-Stage Malware Hidden Behind Cloudflare
17
Sep
2025

MuddyWater Deploys Custom Multi-Stage Malware Hidden Behind Cloudflare

Since early 2025, cybersecurity analysts have witnessed a marked evolution in the tactics and tooling of MuddyWater, the Iranian state-sponsored…

Apple Patches 0-Day Vulnerabilities in Older iPhones and iPads
17
Sep
2025

Apple Patches 0-Day Vulnerabilities in Older iPhones and iPads

Apple has released critical security updates for older iPhone and iPad models, addressing a zero-day vulnerability that has reportedly been…

Chaos Mesh Critical Vulnerabilities Expose Kubernetes Clusters to Takeover
17
Sep
2025

Chaos Mesh Critical Vulnerabilities Expose Kubernetes Clusters to Takeover

Security Research recently uncovered four new flaws, CVE-2025-59358, CVE-2025-59359, CVE-2025-59360, and CVE-2025-59361, in the default configuration of the Chaos Controller…

Hackers Exploit AdaptixC2, an Emerging Open-Source C2 Tool
17
Sep
2025

Hackers Exploit AdaptixC2, an Emerging Open-Source C2 Tool

In early May 2025, Unit 42 researchers observed that AdaptixC2 was used to infect several systems. While many C2 frameworks…

Palo Alto Networks and Microsoft Featured in MITRE ATT&CK Evaluations 2026
17
Sep
2025

Palo Alto Networks and Microsoft Featured in MITRE ATT&CK Evaluations 2026

Two cybersecurity industry leaders have made significant announcements regarding their participation in the upcoming MITRE ATT&CK Evaluations, marking a notable…