Category: GBHackers

Malicious MCP Server Discovered Stealing Sensitive Emails Using AI Agents
26
Sep
2025

Malicious MCP Server Discovered Stealing Sensitive Emails Using AI Agents

Enterprises everywhere are embracing MCP servers—tools that grant AI assistants “god-mode” permissions to send emails, run database queries, and automate…

Apache Airflow Vulnerability Lets Read-Only Users Access Sensitive Data
26
Sep
2025

Apache Airflow Vulnerability Lets Read-Only Users Access Sensitive Data

Apache Airflow maintainers have disclosed a serious security issue, tracked as CVE-2025-54831, that allows users holding only read permissions to…

Malware Gangs Enlist Covert North Korean IT Workers in Corporate Attacks
26
Sep
2025

Malware Gangs Enlist Covert North Korean IT Workers in Corporate Attacks

Malware operators aligned with North Korea have forged a sophisticated partnership with covert IT workers to target corporate organizations worldwide….

New Botnet ‘Loader-as-a-Service’ Turns Home Routers and IoT into Mirai Farms
26
Sep
2025

New Botnet ‘Loader-as-a-Service’ Turns Home Routers and IoT into Mirai Farms

CloudSEK has uncovered a sophisticated Loader-as-a-Service botnet campaign spanning the last six months, leveraging exposed command-and-control logs to orchestrate attacks…

Researchers Map Links Between Major Hacker Groups: LAPSUS$, Scattered Spider, ShinyHunters
26
Sep
2025

Researchers Map Links Between Major Hacker Groups: LAPSUS$, Scattered Spider, ShinyHunters

A loosely connected cybercrime supergroup is exploiting social engineering to compromise Fortune 100 organizations and government agencies. LAPSUS$, Scattered Spider,…

Hackers Breach Active Directory, Steal NTDS.dit for Full Domain Compromise
26
Sep
2025

Hackers Breach Active Directory, Steal NTDS.dit for Full Domain Compromise

Threat actors recently infiltrated a corporate environment, dumped the AD database file NTDS.dit, and nearly achieved full domain control. AD…

Unveiling LummaStealer's Technical Details Through ML-Based Detection Approach
26
Sep
2025

Unveiling LummaStealer’s Technical Details Through ML-Based Detection Approach

In early 2025, LummaStealer was in widespread use by cybercriminals targeting victims throughout the world in multiple industry verticals, including…

An LLM-Driven Malware for Dynamic Reconnaissance and Data Exfiltration
26
Sep
2025

An LLM-Driven Malware for Dynamic Reconnaissance and Data Exfiltration

A novel AI-driven threat leverages LLMs on Hugging Face to execute adaptive reconnaissance and data exfiltration in real time. Rather…

Critical Cisco Flaw Lets Remote Attackers Execute Code on Firewalls and Routers
26
Sep
2025

Critical Cisco Flaw Lets Remote Attackers Execute Code on Firewalls and Routers

Cisco published Security Advisory cisco-sa-http-code-exec-WmfP3h3O revealing a severe flaw in multiple Cisco platforms that handle HTTP-based management. Tracked as CVE-2025-20363,…

New XCSSET Malware Variant Targets macOS App Developers
26
Sep
2025

New XCSSET Malware Variant Targets macOS App Developers

Cybersecurity researchers have discovered an advanced variant of the XCSSET malware specifically targeting macOS developers through infected Xcode projects, introducing…

LockBit 5.0 Ransomware Targets Windows, Linux, and VMware ESXi Systems
26
Sep
2025

LockBit 5.0 Ransomware Targets Windows, Linux, and VMware ESXi Systems

Cybersecurity researchers at Trend Micro have discovered a new and dangerous variant of LockBit ransomware that targets Windows, Linux, and…

Salesforce AI Agent Vulnerability Lets Attackers Steal Sensitive Data
26
Sep
2025

Salesforce AI Agent Vulnerability Lets Attackers Steal Sensitive Data

Cybersecurity researchers at Noma Labs have discovered a critical vulnerability in Salesforce’s Agentforce AI platform that could allow attackers to…