Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

China-Aligned TA415 Exploits Google Sheets & Calendar for C2

China-aligned TA415 hackers have adopted Google Sheets and Google Calendar as covert command-and-control (C2) channels in a sustained espionage campaign targeting U.S. government, academic, and think tank entities. By blending malicious operations into trusted cloud services, TA415 aims to evade…

Hackers Exploit AdaptixC2, an Emerging Open-Source C2 Tool

In early May 2025, Unit 42 researchers observed that AdaptixC2 was used to infect several systems. While many C2 frameworks garner public attention, AdaptixC2 has remained largely under the radar—until Unit 42 documented its deployment by real-world threat actors. This…

Apple Patches 0-Day Vulnerabilities in Older iPhones and iPads

Apple has released critical security updates for older iPhone and iPad models, addressing a zero-day vulnerability that has reportedly been exploited in sophisticated targeted attacks. The iOS 16.7.12 and iPadOS 16.7.12 updates, released on September 15, 2025, patch a serious…

Adtech Abused by Threat Actors to Spread Malicious Advertisements

Malicious advertising campaigns have surged in sophistication, with cybercriminals exploiting and even operating adtech firms to deliver malware, credential stealers and phishing schemes directly through mainstream ad networks. A cluster of interconnected companies—run through shell corporations, hosted on compromised infrastructure,…

Kubernetes C# Client Flaw Exposes API Server to MiTM Attacks

A recently disclosed vulnerability in the Kubernetes C# client library allows attackers to carry out man-in-the-middle (MiTM) attacks against the API server. The flaw stems from improper certificate validation when using custom certificate authorities (CAs). As organizations increasingly rely on…

New FileFix Steganography Campaign Spreads StealC Malware

A sophisticated new campaign that represents the first documented real-world deployment of FileFix attacks beyond proof-of-concept demonstrations. This campaign marks a significant evolution in social engineering tactics, combining advanced steganographic techniques with multilayered obfuscation to deliver the StealC information stealer…

Supply Chain Attack “Shai-Halud” Targets 477 NPM Packages

A major supply chain attack dubbed “Shai-Halud” has impacted the JavaScript ecosystem by targeting over 477 NPM packages, raising serious concerns among developers and organizations relying on software from the Node Package Manager (NPM) registry. This incident reveals both the…

Wave of 40,000+ Cyberattacks Target API Environments

The cybersecurity landscape has witnessed a dramatic escalation in API-targeted attacks during the first half of 2025, with security researchers documenting over 40,000 API incidents across more than 4,000 monitored environments. This surge represents a fundamental shift in how cybercriminals approach digital…

Linux Kernel KSMBD Flaw Lets Remote Attackers Drain Server Resources

A critical vulnerability in the Linux kernel’s KSMBD implementation has been discovered that allows remote attackers to completely exhaust server connection resources through a simple denial-of-service attack. The flaw, tracked as CVE-2025-38501 and dubbed “KSMBDrain,” enables malicious actors to render…