International law enforcement agencies delivered a significant blow to cybercriminals this week with the successful takedown of critical infrastructure belonging to the BlackSuit ransomware gang. The coordinated operation, dubbed “Operation Checkmate,” has effectively dismantled the group’s primary communication and extortion…
Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Hackers Inject Destructive Commands into Amazon’s AI Coding Agent
A significant security breach has exposed critical vulnerabilities in Amazon’s artificial intelligence infrastructure, with hackers successfully injecting malicious computer-wiping commands into the tech giant’s popular AI coding assistant. The incident represents a concerning escalation in cyber threats targeting AI-powered development…
Quid Miner Launches Mobile Cloud Mining App for Seamless, Secure BTC and DOGE Cryptocurrency Daily Income of $17,777
[London, UK ] July 2025 – As digital assets continue to gain mainstream adoption, investors are turning to innovative tools that simplify how they participate in the crypto economy. Quid Miner, a UK-based platform, is leading this shift with a…
Hive0156 Hackers Targeting Government and Military Organizations to Deploy REMCOS RAT
IBM X-Force researchers have identified ongoing cyber campaigns by Hive0156, a Russian-aligned threat actor, systematically targeting Ukrainian government and military personnel with sophisticated malware attacks. The group, which shows significant operational overlap with CERT-UA’s UAC-0184 actor, has been actively deploying…
AI-Powered Cyber Attacks Utilize ML Algorithms to Deploy Malware and Circumvent Traditional Security
Artificial intelligence (AI) and machine learning (ML) are enabling hackers to plan extremely complex assaults that surpass conventional defenses in a threat landscape that is changing quickly. According to the Gigamon Hybrid Cloud Security Survey, which polled over 1,000 security…
Surge in Phishing Attacks Exploiting Spoofed SharePoint Domains and Sneaky 2FA Tactics
Cybersecurity researchers have observed a significant uptick in phishing campaigns that leverage domains designed to impersonate Microsoft SharePoint, employing highly structured naming conventions to evade detection. These malicious domains, which have proliferated since June 26, 2025, follow predictable patterns, including…
APT28 Hackers Unveil First LLM-Powered Malware, Enhancing Attack Techniques with AI
Ukraine’s Computer Emergency Response Team (CERT-UA) has publicly reported the emergence of LAMEHUG, marking it as the inaugural malware to embed large language model (LLM) capabilities directly into its attack chain. This campaign targets Ukrainian government officials through phishing emails…
Elephant APT Group Exploits VLC Player and Encrypted Shellcode in Attacks on Defense Sector
Arctic Wolf Labs has uncovered a sophisticated cyber-espionage operation attributed to the Dropping Elephant advanced persistent threat (APT) group, also known as Patchwork or Quilted Tiger, focusing on Turkish defense contractors specializing in precision-guided missile systems. The campaign, which began…
Threat Actors Using .hwp Files to Distribute RokRAT Malware and Evade Detection Mechanisms
The AhnLab Security intelligence Center (ASEC) has identified a sophisticated campaign where threat actors are leveraging Hangul Word Processor (.hwp) documents to disseminate the RokRAT remote access trojan (RAT), marking a departure from traditional methods that relied on shortcut (LNK)…
NoName057(16) Hackers Target 3,700 Unique Devices Over the Last 13 Months
The pro-Russian hacktivist collective NoName057(16) has been documented executing distributed denial-of-service (DDoS) attacks against over 3,700 unique hosts, predominantly targeting government and public-sector entities in European nations aligned against Russia’s invasion of Ukraine. Emerging in March 2022 amid the full-scale…
UNC3944 Exploits VMware vSphere to Deploy Ransomware and Steal Data from Organizations
The Google Threat Intelligence Group has uncovered a highly advanced cyber operation orchestrated by the threat actor UNC3944, also linked to aliases such as “0ktapus,” “Octo Tempest,” and “Scattered Spider”. This financially motivated group has intensified its focus on sectors…
Splunk Guide to Detect, Mitigate, and Respond to the CitrixBleed 2 Vulnerability
The cybersecurity landscape is grappling with CVE-2025-5777, informally known as “CitrixBleed 2,” an out-of-bounds memory read vulnerability affecting Citrix NetScaler ADC and Gateway devices. This flaw, echoing the notorious CVE-2023-4966 from 2023, enables unauthenticated attackers to leak sensitive memory contents,…
Researchers Exploit Cursor Background Agents to Take Over Amazon EC2 Instance
Security researchers have successfully exploited vulnerabilities in Cursor’s Background Agents to gain unauthorized access to an Amazon EC2 instance, demonstrating critical risks associated with SaaS applications that integrate deeply with cloud infrastructure. The researchers immediately disclosed their findings to Cursor’s…
AI-Driven Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy
Researchers have introduced WhoFi, an AI-powered deep learning pipeline that leverages Wi-Fi Channel State Information (CSI) for person re-identification (Re-ID), achieving a remarkable 95.5% Rank-1 accuracy on the NTU-Fi dataset. Traditional visual Re-ID systems, reliant on convolutional neural networks (CNNs)…
Chinese Hackers Launch Targeted Campaign to Infect Windows Systems with Ghost RAT and PhantomNet Malware
Zscaler ThreatLabz, in collaboration with TibCERT, has uncovered two linked attack campaigns dubbed Operation GhostChat and Operation PhantomPrayers, attributed with high confidence to a China-nexus advanced persistent threat (APT) group. These operations targeted the Tibetan community by capitalizing on heightened…
Google Introduces OSS Rebuild to Boost Security in Open-Source Package Ecosystems
Google has unveiled OSS Rebuild, a pioneering project designed to enhance trust in package registries by independently reproducing upstream artifacts. This initiative targets the escalating threat of supply chain attacks on widely-used dependencies across Python’s PyPI, JavaScript/TypeScript’s npm, and Rust’s…
TP-Link Network Video Recorder Vulnerability Enables Arbitrary Command Execution
TP-Link has disclosed critical security vulnerabilities affecting two of its VIGI Network Video Recorder models, potentially allowing attackers to execute arbitrary commands on the underlying operating system. The vulnerabilities, identified as CVE-2025-7723 and CVE-2025-7724, impact the VIGI NVR1104H-4P V1 and…
Metasploit Module Released to Exploit SharePoint 0-Day Vulnerabilities
Security researchers have released a Metasploit exploitation module targeting critical zero-day vulnerabilities in Microsoft SharePoint Server, marking a significant escalation in the threat landscape for enterprise collaboration platforms. The module exploits a chain of unauthenticated remote code execution flaws identified…
GitLab Publishes Security Update Addressing Several Vulnerabilities in Community and Enterprise Edition
GitLab has released critical security patches addressing six vulnerabilities across its Community Edition (CE) and Enterprise Edition (EE) platforms, with two high-severity cross-site scripting (XSS) flaws requiring immediate attention from self-managed installations. The security update, distributed through versions 18.2.1, 18.1.3,…
AWS Client VPN for Windows Vulnerability Could Allow Privilege Escalation
Amazon Web Services has disclosed a critical security vulnerability in its Client VPN software for Windows that could allow non-administrative users to escalate their privileges to root-level access during the installation process. The vulnerability, tracked as CVE-2025-8069, affects multiple versions…