Aggregator
CVE-2025-20281
Chinese Companies Linked With Hackers Filed Patents Over 10+ Forensics and Intrusion Tools
Cybersecurity researchers have uncovered more than 10 patents for highly intrusive forensics and data collection technologies filed by Chinese companies directly linked to state-sponsored hacking operations, according to a new report from SentinelLABS released this week. The patents, registered by firms named in recent U.S. Department of Justice indictments, detail sophisticated offensive capabilities including encrypted […]
The post Chinese Companies Linked With Hackers Filed Patents Over 10+ Forensics and Intrusion Tools appeared first on Cyber Security News.
New DoubleTrouble Banking Malware Targets Users Through Phishing Sites to Steal Credentials
Researchers at zLabs have been closely monitoring the DoubleTrouble banking trojan, a rapidly evolving malware strain that has shifted its tactics to exploit unsuspecting users across Europe. Initially disseminated via phishing websites mimicking reputable banks, the trojan has now adapted to more insidious distribution methods, including bogus sites hosting samples directly in Discord channels. This […]
The post New DoubleTrouble Banking Malware Targets Users Through Phishing Sites to Steal Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-56134 | Progress LoadMaster up to 7.2.60.1 os command injection
Inside a Real Clickfix Attack: How This Social Engineering Hack Unfolds
Researchers Link New SS7 Encoding Attack to Surveillance Vendor Activity
GitHub security advisory AV25-472
What the Coinbase Breach Says About Insider Risk
Ransomware Attacks Escalate to Physical Threats Against Executives
Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems
The cybersecurity landscape faces a renewed threat as the GOLD BLADE cybercriminal group has significantly evolved their attack methodology, combining previously observed techniques to create a sophisticated infection chain. This new campaign, which surged in July 2025, leverages malicious LNK files paired with a recycled WebDAV technique to deploy their custom RedLoader malware on Windows […]
The post Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems appeared first on Cyber Security News.
20 Best Inventory Management Tools in 2025
Inventory management tools streamline tracking and managing stock levels, orders, sales, and deliveries. It provides real-time visibility into inventory across multiple locations, ensuring accurate stock levels and reducing the risk of overstocking or stockouts. These tools often include features for barcode scanning, which automates updating inventory counts and reduces human error. Advanced inventory management systems […]
The post 20 Best Inventory Management Tools in 2025 appeared first on Cyber Security News.
Камера для защиты — или троян с объективом? Dahua подставила своих пользователей
Espionage costing Australia $8 billion each year, warns intelligence chief
CVE-2024-56135 | Progress LoadMaster up to 7.2.60.1 os command injection
Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Let Attackers Execute Arbitrary Code
Critical vulnerabilities in Lenovo’s IdeaCentre and Yoga All-In-One systems could allow privileged local attackers to execute arbitrary code and access sensitive system information. The vulnerabilities affect InsydeH2O BIOS implementations used in specific Lenovo desktop and all-in-one computer models, with CVSS scores ranging from 6.0 to 8.2, indicating high severity risks. Key Takeaways1. Six BIOS vulnerabilities […]
The post Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Let Attackers Execute Arbitrary Code appeared first on Cyber Security News.
N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
Singapore’s Strategic Approach to State-Linked APT Cyber Threats
Singapore’s recent disclosure of an ongoing cyberattack by the advanced persistent threat (APT) group UNC3886 on critical infrastructure highlights a deliberate strategy favoring technical attribution over overt political linkages. Coordinating Minister for National Security K. Shanmugam announced during the Cyber Security Agency’s (CSA) 10th anniversary event that the nation is contending with this highly sophisticated […]
The post Singapore’s Strategic Approach to State-Linked APT Cyber Threats appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hacker Arrested for Stealing Users Personal Data from Spanish Banks
Spanish authorities have successfully apprehended a sophisticated cybercriminal operating from Girona province, who allegedly orchestrated multiple data breaches targeting financial institutions, educational organizations, and private companies. The arrest represents a significant victory in the ongoing fight against cybercrime in Spain, with investigators uncovering evidence of extensive data theft operations conducted through advanced social engineering techniques […]
The post Hacker Arrested for Stealing Users Personal Data from Spanish Banks appeared first on Cyber Security News.
New Spear Phishing Attack Delivers VIP Keylogger via EMAIL Attachment
A sophisticated new spear-phishing campaign has emerged, deploying the notorious VIP keylogger through carefully crafted email attachments that masquerade as legitimate payment receipts. This latest iteration represents a significant evolution in the malware’s delivery mechanism, showcasing the threat actors’ adaptability and technical sophistication in bypassing modern security measures. The VIP keylogger, previously documented for its […]
The post New Spear Phishing Attack Delivers VIP Keylogger via EMAIL Attachment appeared first on Cyber Security News.