Category: GBHackers

Weaponized npm Packages Target WhatsApp Developers with Remote Kill Switch
07
Aug
2025

Weaponized npm Packages Target WhatsApp Developers with Remote Kill Switch

Socket’s Threat Research Team has uncovered a sophisticated supply chain attack targeting developers integrating with the WhatsApp Business API. Two…

CISA Warns of ‘ToolShell’ Exploitation Chain Targeting SharePoint Servers; IOCs and Detections Released
07
Aug
2025

CISA Warns of ‘ToolShell’ Exploitation Chain Targeting SharePoint Servers; IOCs and Detections Released

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding an exploitation chain dubbed “ToolShell” targeting on-premises…

IRGC-Linked Hackers Target Financial, Government, and Media Organizations
07
Aug
2025

IRGC-Linked Hackers Target Financial, Government, and Media Organizations

A sophisticated network of hackers with ties to Iran’s Islamic Revolutionary Guard Corps (IRGC) unleashed a barrage of cyber-operations designed…

Hackers Exploit Legitimate Drivers to Disable Antivirus and Weaken System Defenses
07
Aug
2025

Hackers Exploit Legitimate Drivers to Disable Antivirus and Weaken System Defenses

Threat actors have been deploying a novel antivirus (AV) killer since at least October 2024, leveraging the legitimate ThrottleStop.sys driver…

SocGholish Uses Parrot and Keitaro TDS to Spread Malware via Fake Updates
07
Aug
2025

SocGholish Uses Parrot and Keitaro TDS to Spread Malware via Fake Updates

SocGholish, operated by the threat actor group TA569, has solidified its role as a prominent Malware-as-a-Service (MaaS) provider, functioning as…

Akamai Ghost Platform Flaw Allows Hidden Second Request Injection
07
Aug
2025

Akamai Ghost Platform Flaw Allows Hidden Second Request Injection

Akamai Technologies disclosed a critical HTTP request smuggling vulnerability affecting its content delivery network platform that could allow attackers to…

New Active Directory Attack Method Bypasses Authentication to Steal Data
07
Aug
2025

New Active Directory Attack Method Bypasses Authentication to Steal Data

Security researchers have uncovered a novel attack technique that exploits weaknesses in hybrid Active Directory (AD) and Entra ID environments…

HeartCrypt-Packed ‘AVKiller’ Tool Actively Deployed in Ransomware Attacks to Disable EDR
07
Aug
2025

HeartCrypt-Packed ‘AVKiller’ Tool Actively Deployed in Ransomware Attacks to Disable EDR

Threat actors are placing a higher priority on neutralizing endpoint detection and response (EDR) systems in order to remain stealthy…

‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel
07
Aug
2025

‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel

Security researchers have unveiled a sophisticated new attack technique called “Ghost Calls” that exploits popular web conferencing platforms to establish…

Nvidia Denies Presence of Backdoors, Kill Switches, or Spyware in Its Chips
07
Aug
2025

Nvidia Denies Presence of Backdoors, Kill Switches, or Spyware in Its Chips

Nvidia has issued a comprehensive denial regarding allegations that its graphics processing units contain backdoors, kill switches, or spyware, emphasizing…

HTTP/1.1 Vulnerability Could Let Attackers Hijack Millions of Sites
07
Aug
2025

HTTP/1.1 Vulnerability Could Let Attackers Hijack Millions of Sites

Security researchers have unveiled a fundamental vulnerability in HTTP/1.1 that could allow attackers to hijack millions of websites, highlighting a…

WhatsApp Removes 6.8 Million Accounts Over Malicious Activity Concerns
07
Aug
2025

WhatsApp Removes 6.8 Million Accounts Over Malicious Activity Concerns

WhatsApp has permanently removed 6.8 million accounts during the first half of 2024 as part of an aggressive crackdown on…