GB Hackers

November 11, 2025

Lazarus Group Deploys Weaponized Documents Against Aerospace & Defense

Security researchers at ENKI have uncovered a sophisticated espionage campaign targeting aerospace and defense organizations, in which the Lazarus Group is weaponizing a new variant of the Comebacker backdoor to infiltrate high-value targets.
November 11, 2025

Researchers Expose Deep Connections Between Maverick and Coyote Banking Malware

Security researchers at CyberProof have uncovered critical connections between two sophisticated banking trojans Maverick and Coyote that are actively targeting Brazilian users through WhatsApp.

Hackers Use Court-Themed Phishing to Deliver Info-Stealer Malware

The sophisticated attack begins with a carefully crafted Spanish-language email impersonating the “17th Municipal Civil Court of the Bogotá Circuit,” complete with formal legal language and institutional details.

Clevo UEFI Leak Allows Signing of Malicious Firmware with BootGuard Keys

Clevo accidentally exposed private keys used in its Intel Boot Guard implementation, allowing attackers to sign malicious firmware that would be trusted during the earliest boot stages.

178,000+ Invoices Expose Customer Data from Invoicely Platform

A significant data exposure incident has affected the cloud-based invoicing platform Invoicely, potentially compromising sensitive information belonging to customers worldwide.

Confucius Hacker Group Weaponizes Documents to Infect Windows Systems with AnonDoor Malware

The Confucius hacking group has significantly evolved its attack methodologies over the past year, transitioning from document stealers like WooperStealer to sophisticated Python-based backdoors including AnonDoor malware.

AresLoader Malware Attacking Citrix Users Through Malicious GitLab Repo

Cyble has recently detected AresLoader, a novel loader that is found to be disseminating numerous malware families. Malware loaders are designed to deploy and execute diverse malware strains on the targeted computer system of the victim.

Hackers Storing Malware in Google Drive as Encrypted ZIP Files To Evade Detection

Google’s Cybersecurity Action Team (GCAT) and Mandiant researched a list of techniques and methods used by threat actors over the period for penetrating the environments and other malicious activities.

ChatGPT Account Takeover Bug Allows Hackers To Gain User's Online Account

An independent security analyst and bug hunter, Nagli (@naglinagli), recently uncovered a critical security vulnerability in ChatGPT that allow attackers to easily exploit the vulnerability and gain complete control of any ChatGPT user’s account.

DoNot APT Hackers Attack Individuals Using Android Malware via Chatting Apps

Interestingly, the malware samples were disguised as chat apps named Ten Messenger.apk and Link Chat QQ.apk This threat actor has carried out cyberattacks in the South Asian region since 2016 when it was first found to be active.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags