In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field Communication (NFC) technology to perpetrate large-scale fraud at ATMs and Point-of-Sale (POS) terminals. According to cyber threat intelligence analysts at Resecurity, numerous banks, FinTech companies, and…
Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials
Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building tool, to orchestrate sophisticated phishing and malware distribution campaigns. Since its launch in 2008, Google Forms has captured nearly 50% of the market share in its…
FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code
A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been disclosed, enabling attackers to execute unauthorized code and trigger persistent denial-of-service (DoS) conditions. The flaw, rated high severity, impacts tamper protection mechanisms in FireEye’s HX service…
APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys
Researchers have uncovered early indicators of malicious infrastructure linked to APT34, also known as OilRig, a suspected Iranian threat group notorious for targeting sectors like education, government, energy, telecom, and NGOs. Between November 2024 and April 2025, a series of…
Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers
Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that could allow attackers to silently drain user funds, without any phishing, social engineering, or wallet connection approval required. As per a report by Coinspect, Industry-leading wallets…
New Malware Hijacks Docker Images Using Unique Obfuscation Technique
A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services according to Darktrace’s honeypot data, has revealed a startling level of sophistication in obfuscation and cryptojacking methods. This novel attack begins with a seemingly innocuous request…
Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials
A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users with malicious Word documents designed to steal sensitive data. Disguised as legitimate sales orders, these emails trick recipients into opening attachments that exploit a known vulnerability,…
Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access
Researchers have exposed a sophisticated cyberattack technique dubbed the “Cookie-Bite Attack,” which allows adversaries to bypass Multi-Factor Authentication (MFA) and maintain persistent access to cloud servers such as Microsoft 365, Azure Portal, and Teams. This method leverages stolen browser cookies,…
Synology Network File System Vulnerability Allows Unauthorized File Access
A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021, has been resolved after allowing unauthorized remote attackers to access sensitive files on vulnerable DiskStation Manager (DSM) devices. The flaw, marked as “Important” in severity by…
Hackers Deploy New Malware Disguised as Networking Software Updates
A sophisticated backdoor has been uncovered targeting major organizations across Russia, including government bodies, financial institutions, and industrial sectors. This malware, distributed under the guise of legitimate updates for ViPNet a widely used software suite for creating secure networks poses…
Super-Smart AI Could Launch Attacks Sooner Than We Think
In a development for cybersecurity, large language models (LLMs) are being weaponized by malicious actors to orchestrate sophisticated attacks at an unprecedented pace. Despite built-in safeguards akin to a digital Hippocratic Oath that prevent these models from directly aiding harmful…
Zyxel Releases Patches for Privilege Management Vulnerabilities in Firewalls
Zyxel, a leading provider of secure networking solutions, has released critical security patches to address two privilege management vulnerabilities in the USG FLEX H series firewalls. The flaws, tracked as CVE-2025-1731 and CVE-2025-1732, could allow authenticated local attackers to escalate…
CrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection
CrowdStrike today announced the general availability of Falcon® Privileged Access, a breakthrough module in its Falcon® Identity Protection suite, aimed at redefining identity security for modern organizations. This launch positions CrowdStrike’s AI-native Falcon platform as the only solution capable of…
CISA Issues Five ICS Advisories Highlighting Critical Vulnerabilities
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released five urgent advisories on April 22, 2025, targeting critical vulnerabilities in widely-used Industrial Control Systems (ICS) from Siemens, ABB, and Schneider Electric. With the increasing frequency and severity of cyberattacks…
Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders
Leading British retailer Marks & Spencer Group plc (M&S) has confirmed it has been grappling with a cyberattack over the past several days, causing temporary disruptions to payment processing and online orders. According to an official company statement, the incident…
Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges
Research disclosed a now-patched high-severity vulnerability in Google Cloud Platform’s (GCP) Cloud Composer service, dubbed ConfusedComposer. It could have allowed attackers to hijack cloud workflows and gain control over critical resources. The flaw highlights risks in automated cloud service orchestration. What…
Moodle Core vulnerabilities Allow Attackers to Evade Security Measures
A recent security audit has uncovered critical vulnerabilities within Moodle, the widely used open-source learning management system (LMS). These vulnerabilities allow attackers to evade core security mechanisms and potentially exploit systems via Server-Side Request Forgery (SSRF). The flaws center around…
Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans
The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure named “Cloudflare tunnel infrastructure to deliver multiple RATs” being exploited by cyber attackers since at least February 2024. This infrastructure has been utilized to host…
Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft
The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on the Python Package Index (PyPI) and one on the npm registry, designed to silently pilfer cryptocurrency secrets, including mnemonic seed phrases and private keys. Released…
Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs
Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge devices playing a critical role in initial attacks, according to the latest annual threat report by Sophos. The report highlights the persistent threat of ransomware,…