Researchers have unearthed a sophisticated supply chain attack targeting Ruby Gems, a popular package manager for the Ruby programming language. Malicious actors have infiltrated the ecosystem by embedding backdoors in seemingly legitimate gems, enabling them to steal sensitive Telegram tokens…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Custom Active Directory Extensions Create Stealthy Backdoors for Corporate Attacks
Active Directory (AD) Group Policy Objects (GPOs) are a cornerstone of centralized management for Windows environments, enabling administrators to configure operating systems, applications, and user settings across all domain-connected machines. The real work of applying these policies on client machines…
ThreatBook Selected In The First-ever Gartner® Magic Quadrant™ For Network Detection And Response (NDR)
Beijing, China, June 4th, 2025, CyberNewsWire After nearly a year of research and evaluation, Gartner released the first “Magic Quadrant for Network Detection and Response” report on May 29, ThreatBook became the only Chinese company selected. As enterprises accelerate their…
ThreatBook Selected In The First-ever Gartner® Magic Quadrant™ For Network Detection And Response (NDR)
Beijing, China, June 4th, 2025, CyberNewsWire After nearly a year of research and evaluation, Gartner released the first “Magic Quadrant for Network Detection and Response” report on May 29, ThreatBook became the only Chinese company selected. As enterprises accelerate their…
DollyWay World Domination Attack Compromises 20,000+ Sites
Since 2016, the “DollyWay World Domination” campaign has quietly compromised more than 20,000 WordPress websites worldwide, exploiting vulnerabilities in plugins and themes to redirect visitors to malicious destinations. The operation’s name comes from a telltale code string found in infected…
New Linux PumaBot Targets IoT Devices with SSH Credential Brute-Force Attack
A new and insidious threat has surfaced in the cybersecurity landscape as Darktrace’s Threat Research team uncovers PumaBot, a Go-based Linux botnet meticulously designed to exploit embedded Internet of Things (IoT) devices. Unlike conventional botnets that cast a wide net…
Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data
A pro-Ukrainian hacktivist group known as BO Team, also operating under aliases such as Black Owl, Lifting Zmiy, and Hoody Hyena, has emerged as a formidable threat to Russian organizations in 2025. This group, which publicly declared its intentions via…
Android Security Update Addresses High-Severity Privilege Escalation Flaws
The Android Security Bulletin for June 2025, published on June 2, details a series of high-severity vulnerabilities affecting a wide range of Android devices. Security patch levels of 2025-06-05 or later address all reported issues, with source code patches set…
State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems
The manufacturing sector has emerged as a prime target for cyber attackers in 2024, with a staggering 71% surge in active threat actors compared to the previous year, according to a recent report by Forescout Technologies. Between 2024 and the…
Top Russian Dark Web Market Tools Drive Surge in Credential Theft Attacks
In a chilling revelation for cybersecurity professionals, the Russian Market has solidified its position as the leading hub for stolen credentials, fueling a dramatic rise in credential theft attacks worldwide. According to a 2024 report by ReliaQuest’s GreyMatter Digital Risk…