International law enforcement agencies delivered a significant blow to cybercriminals this week with the successful takedown of critical infrastructure belonging to the BlackSuit ransomware gang. The coordinated operation, dubbed “Operation Checkmate,” has effectively dismantled the group’s primary communication and extortion…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Hackers Inject Destructive Commands into Amazon’s AI Coding Agent
A significant security breach has exposed critical vulnerabilities in Amazon’s artificial intelligence infrastructure, with hackers successfully injecting malicious computer-wiping commands into the tech giant’s popular AI coding assistant. The incident represents a concerning escalation in cyber threats targeting AI-powered development…
Quid Miner Launches Mobile Cloud Mining App for Seamless, Secure BTC and DOGE Cryptocurrency Daily Income of $17,777
[London, UK ] July 2025 – As digital assets continue to gain mainstream adoption, investors are turning to innovative tools that simplify how they participate in the crypto economy. Quid Miner, a UK-based platform, is leading this shift with a…
Hive0156 Hackers Targeting Government and Military Organizations to Deploy REMCOS RAT
IBM X-Force researchers have identified ongoing cyber campaigns by Hive0156, a Russian-aligned threat actor, systematically targeting Ukrainian government and military personnel with sophisticated malware attacks. The group, which shows significant operational overlap with CERT-UA’s UAC-0184 actor, has been actively deploying…
AI-Powered Cyber Attacks Utilize ML Algorithms to Deploy Malware and Circumvent Traditional Security
Artificial intelligence (AI) and machine learning (ML) are enabling hackers to plan extremely complex assaults that surpass conventional defenses in a threat landscape that is changing quickly. According to the Gigamon Hybrid Cloud Security Survey, which polled over 1,000 security…
Surge in Phishing Attacks Exploiting Spoofed SharePoint Domains and Sneaky 2FA Tactics
Cybersecurity researchers have observed a significant uptick in phishing campaigns that leverage domains designed to impersonate Microsoft SharePoint, employing highly structured naming conventions to evade detection. These malicious domains, which have proliferated since June 26, 2025, follow predictable patterns, including…
APT28 Hackers Unveil First LLM-Powered Malware, Enhancing Attack Techniques with AI
Ukraine’s Computer Emergency Response Team (CERT-UA) has publicly reported the emergence of LAMEHUG, marking it as the inaugural malware to embed large language model (LLM) capabilities directly into its attack chain. This campaign targets Ukrainian government officials through phishing emails…
Elephant APT Group Exploits VLC Player and Encrypted Shellcode in Attacks on Defense Sector
Arctic Wolf Labs has uncovered a sophisticated cyber-espionage operation attributed to the Dropping Elephant advanced persistent threat (APT) group, also known as Patchwork or Quilted Tiger, focusing on Turkish defense contractors specializing in precision-guided missile systems. The campaign, which began…
Threat Actors Using .hwp Files to Distribute RokRAT Malware and Evade Detection Mechanisms
The AhnLab Security intelligence Center (ASEC) has identified a sophisticated campaign where threat actors are leveraging Hangul Word Processor (.hwp) documents to disseminate the RokRAT remote access trojan (RAT), marking a departure from traditional methods that relied on shortcut (LNK)…
NoName057(16) Hackers Target 3,700 Unique Devices Over the Last 13 Months
The pro-Russian hacktivist collective NoName057(16) has been documented executing distributed denial-of-service (DDoS) attacks against over 3,700 unique hosts, predominantly targeting government and public-sector entities in European nations aligned against Russia’s invasion of Ukraine. Emerging in March 2022 amid the full-scale…