❌

Normal view

There are new articles available, click to refresh the page.
Today β€” 8 December 2025GBHackers

Exposing the Core Functionalities of QuasarRAT: Encrypted Configuration and Obfuscation Techniques

8 December 2025 at 08:48

In the second installment of the β€œAdvent of Configuration Extraction” series, security researchers have unwrapped QuasarRAT, a widely-deployed .NET remote access trojan (RAT), revealing sophisticated techniques for extracting its encrypted configuration from both clean and obfuscated binary samples. The analysis demonstrates a reproducible methodology using Jupyter Notebook, pythonnet, and dnSpy, providing cybersecurity professionals with practical […]

The post Exposing the Core Functionalities of QuasarRAT: Encrypted Configuration and Obfuscation Techniques appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

NVIDIA and Lakera AI Propose Unified Framework for Agent Safety

8 December 2025 at 08:26

NVIDIA and Lakera AI have introduced a groundbreaking unified security and safety framework designed to address the emerging challenges posed by autonomous AI agents in enterprise environments. This collaborative effort represents a significant step forward in making agentic systems AI systems capable of independent planning, tool use, and multi-step task execution safer and more secure […]

The post NVIDIA and Lakera AI Propose Unified Framework for Agent Safety appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Apple, Google, and Samsung May Soon Activate Always-On GPS in India

By: Divya
8 December 2025 at 08:16

India’s government is considering a controversial proposal that could require smartphone manufacturers to enable satellite location tracking on all devices permanently. The plan has sparked significant backlash from major tech companies, including Apple, Google, and Samsung, who argue the measure poses serious privacy and security risks. The proposal originates in India’s telecom industry, specifically the […]

The post Apple, Google, and Samsung May Soon Activate Always-On GPS in India appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Exploit Multiple Ad Networks to Distribute Triada Malware to Android Users

8 December 2025 at 08:06

Adex, the anti-fraud and traffic-quality platform operating under AdTech Holding, has successfully identified and neutralized a sophisticated, multi-year malware operation linked to the infamous Triada Trojan. This campaign, which has persistently targeted the mobile advertising ecosystem, underscores the evolving dangers of supply-chain attacks in the digital ad space. According to industry data released alongside the […]

The post Hackers Exploit Multiple Ad Networks to Distribute Triada Malware to Android Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

US Contributes to 44% of Cyber Attacks; Public Administration Targeted for Financial Gains

8 December 2025 at 07:50

Global cybercrime is accelerating toward a projected cost of 15.63 trillion dollars by 2029, up from an estimated 10.5 trillion dollars today, as criminals exploit new technologies faster than businesses can defend against them. Yet 59% of organisations say they suffered at least one successful cyber attack in the past 12 months, and one in […]

The post US Contributes to 44% of Cyber Attacks; Public Administration Targeted for Financial Gains appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Exploit Delivery Receipts in Messaging Apps to Steal Users’ Private Information

By: Divya
8 December 2025 at 07:13

A critical security vulnerability has been discovered affecting billions of WhatsApp and Signal users worldwide. Researchers found that hackers can exploit delivery receipts to secretly monitor user activity, track daily routines, and drain battery life, all without leaving any visible trace.​ The attack, calledΒ β€œCareless Whisper,” uses the delivery receipt feature that confirms when messages reach their […]

The post Hackers Exploit Delivery Receipts in Messaging Apps to Steal Users’ Private Information appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Operation Kitten: Hacktivist Groups Targeting Israel with Cyberattacks

8 December 2025 at 07:02

A new platform known as the β€œkitten” project has emerged as a coordination hub for hacktivist campaigns targeting Israel, operating at the intersection of cyber activism and state-aligned influence. While the operators publicly deny direct ties to Iran, technical evidence and infrastructure traces indicate a close relationship with an Iranian cybersecurity ecosystem and pro-Iranian hacktivist […]

The post Operation Kitten: Hacktivist Groups Targeting Israel with Cyberattacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks

8 December 2025 at 05:45

A new security analysis has unveiled β€œLOLPROX,” a comprehensive catalog of β€œLiving Off The Land” (LOL) techniques specifically targeting Proxmox Virtual Environment (VE). The research, detailed by security researcher Andy Gill (ZephrSec), highlights how threat actors can weaponize the popular open-source hypervisor’s native tools to execute stealthy, deep-persistence attacks that bypass traditional network monitoring and […]

The post LOLPROX Unveils Undetected Exploitation Routes for Stealthy Hypervisor Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation

By: Divya
8 December 2025 at 05:25

The Cybersecurity and Infrastructure Security Agency (CISA) has officially added a high-severity vulnerability affecting Meta’s React Server Components to its Known Exploited Vulnerabilities (KEV) catalog. Assigned the identifierΒ CVE-2025-55182, the security flaw dubbed β€œReact2Shell” by the security community is currently being exploited in the wild, prompting urgent calls for remediation. React2Shell is a Remote Code Execution […]

The post CISA Adds Critical React2Shell Vulnerability to KEV Catalog After Active Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Porsche Cars Disabled After Major Failure in Installed Satellite Security System

By: Divya
8 December 2025 at 04:13

Hundreds of Porsche owners across Russia are facing a significant problem as their luxury cars have suddenly stopped working. The issue stems from a failure in the factory-installed security and tracking systems, which have completely shut down the vehicles. According to reports from the Rolf dealership network, the largest Porsche service provider in Russia, the […]

The post Porsche Cars Disabled After Major Failure in Installed Satellite Security System appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Next.js Releases Scanner to Detect and Fix Apps Affected by React2Shell Vulnerability

By: Divya
8 December 2025 at 03:50

Next.js developers have a new weapon in the fight against the critical β€œReact2Shell” vulnerability. This new scanner offers a simple, one-line solution for development teams to identify vulnerable versions of Next.js and React Server Components (RSC) and apply the necessary security updates instantly. Vercel Labs has released a dedicated command-line tool,Β fix-react2shell-next, designed to automatically detect […]

The post Next.js Releases Scanner to Detect and Fix Apps Affected by React2Shell Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Hackers Target Developers Using Malicious VS Code and Cursor AI Extensions

8 December 2025 at 03:43

Visual Studio Code and AI-powered IDEs such as Cursor AI and Windsurf are emerging as one of the most critical and overlooked attack surfaces in the modern software supply chain. Installed on millions of developer machines worldwide, these tools often run with access to source code, secrets, and production credentials. New research shows that compromising […]

The post Hackers Target Developers Using Malicious VS Code and Cursor AI Extensions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

OceanLotus Targets Xinchuang Ecosystem with Sophisticated Supply Chain Attacks

8 December 2025 at 02:36

The advanced persistent threat (APT) group known as OceanLotus (APT32) has been observed launching a sophisticated cyberespionage campaign specifically targeting China’s β€œXinchuang” initiative the nation’s strategic push to replace foreign technology with indigenized, secure IT ecosystems. In a notable shift from traditional Windows-centric attacks, OceanLotus is now deploying specialized weaponry designed to compromise domestic Linux-based […]

The post OceanLotus Targets Xinchuang Ecosystem with Sophisticated Supply Chain Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

WatchGuard Firebox Vulnerabilities Let Hackers Skip Integrity Validation and Plant Malicious Code

By: Divya
8 December 2025 at 01:57

WatchGuard Technologies has disclosed critical security vulnerabilities affecting its Firebox firewall products that could allow attackers to bypass system integrity checks and execute malicious code. The company released patches on December 4, 2025, addressing six distinct vulnerabilities that pose significant risks to enterprise network security. Multiple WatchGuard Firebox Vulnerabilities One of the most concerning flaws […]

The post WatchGuard Firebox Vulnerabilities Let Hackers Skip Integrity Validation and Plant Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Indonesia’s Gambling Industry Reveals Clues of Nationwide Cyber Involvement

8 December 2025 at 01:14

A massive Indonesian-speaking cybercrime operation spanning over 14 years has been uncovered, revealing a sophisticated infrastructure that shows hallmarks of state-level backing and resources typically associated with advanced persistent threat actors. Security researchers at Malanta have exposed what may be one of the largest and most complex Indonesian-speaking cyber operations ever documented a sprawling ecosystem […]

The post Indonesia’s Gambling Industry Reveals Clues of Nationwide Cyber Involvement appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes

By: Divya
8 December 2025 at 01:05

Cal.com has disclosed a critical authentication bypass vulnerability that could allow attackers to gain unauthorized access to user accounts by exploiting a flaw in password verification logic. The flaw, tracked as CVE-2025-66489 and assigned a critical CVSS v4 score of 9.3, affects all versions of Cal.com up to and including 5.9.7. Users are urged to […]

The post Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Shanya EDR Killer: The New Favorite Tool for Ransomware Operators

8 December 2025 at 00:46

A sophisticated new β€œpacker-as-a-service” tool known as Shanya has emerged in the cybercriminal underground, rapidly becoming a preferred weapon for major ransomware groups looking to neutralize endpoint defenses. According to new research from Sophos, Shanya is an evolution in the β€œEDR killer” market, effectively succeeding previous tools like HeartCrypt. The malware is designed to blind […]

The post Shanya EDR Killer: The New Favorite Tool for Ransomware Operators appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Critical React2Shell RCE Flaw Actively Exploited to Run Malicious Code

By: Divya
8 December 2025 at 00:37

A critical remote code execution vulnerability in React Server Components has emerged as an active exploitation target, with security researchers observing widespread automated attacks across the internet. The flaw, tracked asΒ CVE-2025-55182Β and dubbed β€œReact2Shell,” affects React and downstream ecosystems, including the popular Next.js framework, prompting urgent calls for immediate patching. CVE ID Vulnerability CVSS Score Severity […]

The post Critical React2Shell RCE Flaw Actively Exploited to Run Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Critical Vulnerabilities Found in GitHub Copilot, Gemini CLI, Claude, and Other AI Tools Affect Millions

8 December 2025 at 00:19

A groundbreaking security research project has uncovered a new class of vulnerabilities affecting virtually every major AI-powered integrated development environment (IDE) and coding assistant on the market. Dubbed β€œIDEsaster,” this attack chain exploits fundamental features of underlying IDE platforms to exfiltrate data and execute remote code, impacting millions of developers worldwide. The research, conducted over […]

The post Critical Vulnerabilities Found in GitHub Copilot, Gemini CLI, Claude, and Other AI Tools Affect Millions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

LockBit 5.0 Infrastructure Exposed as Hackers Leak Critical Server Data

By: Divya
7 December 2025 at 23:52

Security researchers have uncovered critical infrastructure details for the notorious LockBit 5.0 ransomware operation, including the IP address 205.185.116.233 and the domain karma0.xyz, which hosts the group’s latest leak site. The discovery represents a significant operational security failure for the cybercriminal organization. Cybersecurity researcher Rakesh Krishnan first publicized the findings on December 5, 2025, identifying […]

The post LockBit 5.0 Infrastructure Exposed as Hackers Leak Critical Server Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

❌
❌