Aggregator
Hackers leak images and comments from women dating safety app Tea
Joint cyber security advisory on Scattered Spider
Qwins Ltd: Bulletproof Hosting Provider Powering Global Malware Campaigns
Security researchers may have discovered a reliable hosting company run by Qwins Ltd. that supports a broad range of international malware operations in a recent analysis resulting from standard follow-up on Lumma infostealer infections. Lumma, consistently ranking among the top five malware families according to platforms like abuse.ch and ANY.RUN, provided an abundant source of […]
The post Qwins Ltd: Bulletproof Hosting Provider Powering Global Malware Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
40 лет вы думали, что играете в Тетрис? А на самом деле — сталкиваетесь с пределами Вселенной
Mapping Mayhem: Security’s Blind Spots in Identity Security
For years, primarily driven by regulatory compliance mandates, such as the Sarbanes-Oxley Act of 2002, identity and access management has been treated as a regulatory compliance exercise, rather than the security exercise it should be — and simply checking off compliance requirements leaves many organizations with a dangerous and false sense of security. This is..
The post Mapping Mayhem: Security’s Blind Spots in Identity Security appeared first on Security Boulevard.
GOLD BLADE remote DLL sideloading attack deploys RedLoader
Unveiling 0bj3ctivityStealer’s Execution Chain: New Capabilities and Exfiltration Techniques Exposed
In the ever-evolving infostealer landscape, 0bj3ctivityStealer emerges as a formidable threat, blending advanced obfuscation with targeted data exfiltration. Discovered earlier this year by HP Wolf Security researchers, this .NET-based malware has been observed in proactive threat hunting by the Trellix Advanced Research Center, revealing a novel phishing-driven campaign. The infection initiates through spearphishing emails themed […]
The post Unveiling 0bj3ctivityStealer’s Execution Chain: New Capabilities and Exfiltration Techniques Exposed appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
French Telco Orange Hit by Cyber-Attack
У вас долги и плохая кредитная история? Вы — идеальная цель для этой схемы
2FAuth: A Web app to manage your Two-Factor Authentication (2FA) accounts and generate their security codes
Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware
ToxicPanda Android Banking Malware Compromises Over 4,500 Devices to Harvest Banking Credentials
The ToxicPanda Android banking trojan has emerged as a significant threat, compromising over 4,500 devices primarily in Portugal and Spain as of early 2025, with a focus on stealing banking credentials, overlaying PIN and pattern codes, and enabling unauthorized transactions. Initially identified by Trend Micro in 2022 targeting Southeast Asia, the malware shifted to Europe […]
The post ToxicPanda Android Banking Malware Compromises Over 4,500 Devices to Harvest Banking Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ransomware Hits Healthcare Through Applications
Ransomware is evolving and healthcare is in the crosshairs. As apps and APIs become critical to patient care, they also open new threat vectors. Compliance alone isn't enough - organizations must act fast to close security gaps and defend against app-based attacks.