Category: GBHackers

Threat Actors Exploit AI to Scale Attacks and Target Autonomous Agents
05
Aug
2025

Threat Actors Exploit AI to Scale Attacks and Target Autonomous Agents

Adversaries are using artificial intelligence (AI) to increase their operational efficiency in a fast-changing threat landscape. They are scaling attacks…

CNCERT Accuses U.S. Intelligence of Cyberattacks on Chinese Military-Industrial Targets
04
Aug
2025

CNCERT Accuses U.S. Intelligence of Cyberattacks on Chinese Military-Industrial Targets

China’s National Computer Network Emergency Response Technical Team/Coordination Center (CNCERT) has publicly accused U.S. intelligence agencies of orchestrating sophisticated cyberattacks…

Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains
04
Aug
2025

Modular Malware Suite Sold by Threat Actors Through Public Storefront Domains

A threat actor operating under the moniker Cyber Products has established a public-facing storefront at cyberproducts[.]io to distribute their modular…

Surge in Threat Actor Exploitation Attempts Serves as Early Warning of Emerging Cyber Vulnerabilities
04
Aug
2025

Surge in Threat Actor Exploitation Attempts Serves as Early Warning of Emerging Cyber Vulnerabilities

Researchers have discovered a continuous relationship between increases in threat actor activity and the eventual disclosure of new Common Vulnerabilities…

Interlock Ransomware Uses ClickFix Exploit to Execute Malicious Commands on Windows
04
Aug
2025

Interlock Ransomware Uses ClickFix Exploit to Execute Malicious Commands on Windows

The Interlock ransomware group was connected to several sophisticated cyber incidents that targeted firms in North America and Europe, according…

Researchers Use 0-Day to Exploit Google kernelCTF and Debian 12
04
Aug
2025

Researchers Use 0-Day to Exploit Google kernelCTF and Debian 12

Security researchers have uncovered and weaponized a critical Use-After-Free vulnerability (CVE-2025-38001) in the Linux network packet scheduler’s HFSC queuing discipline,…

$3.5B Stolen in Silent Breach
04
Aug
2025

$3.5B Stolen in Silent Breach

A massive cryptocurrency theft that remained hidden for over four years has been uncovered, revealing what may be the largest…

Mozilla Issues Warning on Phishing Campaign Targeting Add-on Developer Accounts
04
Aug
2025

Mozilla Issues Warning on Phishing Campaign Targeting Add-on Developer Accounts

Mozilla has issued an urgent security warning to Firefox add-on developers following the detection of a sophisticated phishing campaign targeting…

FUJIFILM Printer Flaw Allows Attackers to Trigger DoS Attacks
04
Aug
2025

FUJIFILM Printer Flaw Allows Attackers to Trigger DoS Attacks

FUJIFILM Business Innovation has disclosed a critical vulnerability affecting multiple printer models that could allow attackers to launch denial-of-service (DoS)…

Hackers Leverage AI to Craft Malicious NPM Package That Drains Crypto Wallets
04
Aug
2025

Hackers Leverage AI to Craft Malicious NPM Package That Drains Crypto Wallets

Security researchers at Safety have uncovered an AI-generated malicious NPM package dubbed @kodane/patch-manager, engineered as an advanced cryptocurrency wallet drainer….

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Allegedly Leaked Online
04
Aug
2025

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Allegedly Leaked Online

Digital Rights Management (DRM) systems are essential for safeguarding premium streaming content against unauthorized access and piracy, with Microsoft’s PlayReady…

ShadowSyndicate infrastructure Used by Multiple ransomware Groups Including Cl0p, LockBit and RansomHub
04
Aug
2025

ShadowSyndicate infrastructure Used by Multiple ransomware Groups Including Cl0p, LockBit and RansomHub

Cybersecurity researchers have uncovered significant overlaps between the attack infrastructure of ShadowSyndicate, also known as Infra Storm by Group-IB, and…