The financially motivated threat cluster UNC6040, tracked by Google Threat Intelligence Group (GTIG), has been orchestrating a series of voice phishing (vishing) campaigns specifically aimed at compromising Salesforce environments of multinational corporations. Unlike traditional cyberattacks that leverage software vulnerabilities, UNC6040…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Cisco IMC Vulnerability Allows Attackers to Gain Elevated Privileges
Cisco has issued a security advisory regarding a critical privilege escalation vulnerability (CVE-2025-20261) affecting its Integrated Management Controller (IMC) software used in UCS B-Series, C-Series, S-Series, and X-Series servers. The flaw, rated with a CVSS base score of 8.8, could…
CISA Releases TTPs & IoCs for Play Ransomware That Hacked 900+ Orgs
The Cybersecurity and Infrastructure Security Agency (CISA), alongside the Federal Bureau of Investigation (FBI) and the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), has released detailed Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoCs) for the…
Critical Cisco Nexus Dashboard Vulnerability Lets Attackers Impersonate Managed Devices
Cisco has issued a high-severity security advisory (ID: cisco-sa-ndfc-shkv-snQJtjrp) regarding a critical SSH host key validation vulnerability in its Nexus Dashboard Fabric Controller (NDFC), tracked as CVE-2025-20163. The flaw, assigned a CVSS 3.1 base score of 8.7, could allow unauthenticated,…
Cisco Alerts Users to Critical ISE Vulnerability Exposing Sensitive Data
Cisco has issued a critical security advisory (Advisory ID: cisco-sa-ise-aws-static-cred-FPMjUcm7) for its Identity Services Engine (ISE) when deployed on major cloud platforms—Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI). The vulnerability, tracked as CVE-2025-20286 and classified under…
U.S. Authorities Shut Down Major Dark Web Marketplace with 117,000 Users
In a blow to the cybercrime underworld, the U.S. Attorney’s Office for the Eastern District of Virginia announced the seizure of approximately 145 domains, spanning both darknet and traditional internet spaces, associated with the notorious BidenCash marketplace. This coordinated operation,…
Outlook Users Targeted by New HTML-Based Phishing Scheme
A recent phishing campaign has revealed a sophisticated technique that exploits Microsoft Outlook’s unique handling of HTML emails to conceal malicious links from corporate users. The attack, initially appearing as a standard phishing attempt impersonating a Czech bank, leverages conditional…
Exploiting Clickfix: AMOS macOS Stealer Evades Security to Deploy Malicious Code
A newly uncovered campaign involving an Atomic macOS Stealer (AMOS) variant has emerged, showcasing the evolving sophistication of multi-platform social engineering attacks. This campaign, discovered during routine attacker infrastructure analysis, leverages typo-squatted domains mimicking Spectrum, a prominent U.S.-based telecommunications provider…
Threat Actors Exploit Malware Loaders to Circumvent Android 13+ Accessibility Safeguards
Threat actors have successfully adapted to Google’s stringent accessibility restrictions introduced in Android 13 and later versions. These safeguards, rolled out in May 2022, were designed to prevent malicious applications from abusing accessibility services by blocking such access for sideloaded…
SCATTERED SPIDER Hackers Target IT Support Teams & Bypass Multi-Factor Authentication
A cybercriminal group known as SCATTERED SPIDER has emerged as a formidable threat, targeting sectors like hospitality, telecommunications, finance, and retail with unprecedented sophistication. This group, active since at least 2022, differentiates itself from traditional ransomware actors by blending advanced…
New Eleven11bot Hacks 86,000 IP Cameras for Large-Scale DDoS Attack
The newly identified Eleven11bot malware has compromised over 86,000 IP cameras across the Asia-Pacific (APAC) region, transforming these devices into a massive botnet for launching large-scale Distributed Denial of Service (DDoS) attacks. This incident, detailed in the Q1 2025 DDoS…
DCRat Targets Latin American Users to Steal Banking Credentials
IBM X-Force has uncovered a series of targeted email campaigns orchestrated by Hive0131, a financially motivated threat group likely originating from South America. Observed in early May 2025, these campaigns specifically target users in Colombia, masquerading as official notifications from…
Lumma Infostealer Developers Persist in Their Malicious Activities
A coordinated operation by Europol, the FBI, Microsoft, and other public and private sector partners targeted the Lumma infostealer, a prolific malware distributed via a malware-as-a-service (MaaS) model. Known for stealing credentials and being a tool of choice for notorious…
Aembit Recognized on the 2025 Rising in Cyber List of Top Cybersecurity Startups
Aembit, the workload identity and access management (IAM) company, today announced its inclusion in Rising in Cyber 2025, an independent list launched by Notable Capital to spotlight the 30 most promising cybersecurity startups shaping the future of security. Unlike traditional rankings,…
Malicious ‘Sleeper Agent’ Browser Extensions Infected 1.5 Million Users Globally
LayerX, a cybersecurity firm, has uncovered a sophisticated network of malicious browser extensions, dubbed “sleeper agents,” that are currently installed on nearly 1.5 million devices worldwide. These extensions, masquerading as legitimate in-browser sound management tools, are built on a shared…
Windows Authentication Coercion Attacks Present Major Risks to Enterprise Networks
Authentication coercion remains a potent attack vector in Windows environments, enabling attackers with even low-privileged domain accounts to force targeted systems, often high-value servers or domain controllers, to authenticate to attacker-controlled hosts. This technique is closely tied to NTLM and…
35,000 Internet-Connected Solar Power Systems Vulnerable to Cyberattacks
Forescout Research Vedere Labs has uncovered that nearly 35,000 solar power devices, including inverters, data loggers, and gateways from 42 vendors, are exposed on the internet with vulnerable management interfaces. Identified using the Shodan search engine, these devices represent a…
APT37 Hackers Fake Academic Forum Invites to Deliver Malicious LNK Files via Dropbox Platform
The North Korean state-sponsored hacking group APT37 has launched a sophisticated spear phishing campaign in March 2025, targeting activists focused on North Korean issues. Disguised as invitations to an academic forum hosted by a South Korean national security think tank,…
New Malware Attack Uses Malicious Chrome & Edge Extensions to Steal Sensitive Data
Cybersecurity experts from Positive Technologies’ Security Expert Center have uncovered a sophisticated malicious campaign dubbed “Phantom Enigma,” primarily targeting Brazilian residents while also affecting organizations worldwide. This campaign employs a dual-attack strategy, utilizing malicious browser extensions for Google Chrome, Microsoft…
Wireshark Certified Analyst – Wireshark Released Official Certification for Security Professionals
The Wireshark Foundation has officially launched the Wireshark Certified Analyst (WCA-101) certification, marking a significant milestone for IT professionals and network engineers worldwide. Designed by Wireshark’s developers and leading protocol experts, the WCA-101 exam is tailored to validate advanced proficiency…