Category: GBHackers

Hackers Exploit Social Engineering to Gain Remote Access in Just 5 Minutes
07
Aug
2025

Hackers Exploit Social Engineering to Gain Remote Access in Just 5 Minutes

Cybersecurity experts are raising alarms over a sophisticated social engineering attack that allowed threat actors to compromise corporate systems in…

New Microsoft Exchange Server Vulnerability Allows Unauthorized Admin Privilege Escalation
07
Aug
2025

New Microsoft Exchange Server Vulnerability Allows Unauthorized Admin Privilege Escalation

Microsoft has disclosed a high-severity security vulnerability affecting Exchange Server hybrid deployments that could allow attackers with administrative access to…

Mustang Panda Targets Windows Users with ToneShell Malware Disguised as Google Chrome
07
Aug
2025

Mustang Panda Targets Windows Users with ToneShell Malware Disguised as Google Chrome

The China-aligned threat actor Mustang Panda, also known as Earth Preta, HIVE0154, RedDelta, and Bronze President, has been deploying the…

Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT
07
Aug
2025

Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT

North Korean state-sponsored threat actors associated with the Lazarus Group, specifically the subgroup known as Famous Chollima, have evolved their…

Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities
06
Aug
2025

Akira and Lynx Ransomware Target MSPs Using Stolen Credentials and Exploited Vulnerabilities

The Acronis Threat Research Unit (TRU) dissected recent samples from the Akira and Lynx ransomware families, revealing incremental enhancements in…

Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets
06
Aug
2025

Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets

SentinelLABS has exposed a sophisticated series of cryptocurrency scams where threat actors distribute malicious smart contracts masquerading as automated trading…

Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
06
Aug
2025

Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks

Security researchers have identified a sophisticated new tactic employed by Akira ransomware operators, who are exploiting legitimate Windows drivers to…

Fake Antivirus App Delivers LunaSpy Malware to Android Devices
06
Aug
2025

Fake Antivirus App Delivers LunaSpy Malware to Android Devices

A sophisticated cybercrime campaign has been discovered targeting Android users through fake antivirus applications that actually deliver LunaSpy spyware to…

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware
06
Aug
2025

UAC-0099 Hackers Weaponize HTA Files to Deploy MATCHBOIL Loader Malware

UAC-0099 is a threat actor organization that has been targeting state officials, defense forces, and defense-industrial firms in a series…

Threat Actors Use GenAI to Launch Phishing Attacks Mimicking Government Websites
06
Aug
2025

Threat Actors Use GenAI to Launch Phishing Attacks Mimicking Government Websites

Threat actors are increasingly leveraging generative AI (GenAI) tools to craft highly convincing phishing websites that impersonate legitimate government portals….

Sophisticated DevilsTongue Spyware Tracks Windows Users Worldwide
06
Aug
2025

Sophisticated DevilsTongue Spyware Tracks Windows Users Worldwide

Insikt Group has uncovered new infrastructure tied to the Israeli spyware vendor Candiru, now operating under Saito Tech Ltd., highlighting…

Fake CAPTCHA Used in New ClickFix Attack to Deploy Malware Payload
06
Aug
2025

Fake CAPTCHA Used in New ClickFix Attack to Deploy Malware Payload

ClickFix, which began as a red-team simulation tool in September 2024, has quickly developed into a widespread malware delivery system…