GBhackers

Rhadamanthys Stealer Servers Reportedly Seized

A major law enforcement operation has reportedly compromised the infrastructure of the Rhadamanthys stealer, a prominent malware-as-a-service platform. The takedown has disrupted access to its command-and-control (C2) servers and control panels.

Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins

A sophisticated phishing campaign is actively targeting email users by impersonating internal security alert systems. These emails appear to originate from the recipient’s own corporate domain.

New Phishing Campaign Targets Meta Business Suite Users

A large-scale phishing campaign is actively targeting users of Meta Business Suite by exploiting Facebook’s legitimate business invitation infrastructure. Over 40,000 phishing emails have been distributed to more than 5,000 SMBs.

Zoom Workplace for Windows Flaw Allows Local Privilege Escalation

A high-severity vulnerability has been identified in the Zoom Workplace VDI Client for Windows. This flaw allows authenticated local attackers to escalate privileges due to improper verification of cryptographic signatures in the installer.

New “LANDFALL” Android Malware Uses Samsung 0-Day Vulnerability Hidden in WhatsApp Images

A newly discovered Android spyware campaign, dubbed LANDFALL, has exploited a critical zero-day vulnerability (CVE-2025-21042) in Samsung’s image processing library to deliver surveillance malware via malformed DNG image files sent through WhatsApp.

New Microsoft Teams Feature Exposes Users to Phishing and Malware Risks

Microsoft is introducing a new feature in Teams that allows users to initiate chats with any email address, even if the recipient is not a Teams user. It significantly increases the risk of phishing, impersonation, and malware attacks.

Influence of Chinese Hacker Organizations on U.S. Foreign Policy

A coordinated cyber-espionage campaign attributed to Chinese state-linked threat actors has targeted a prominent U.S. non-profit involved in foreign policy advocacy. The operation demonstrates advanced persistence techniques.

Sandworm Hackers Target Ukrainian Organizations With Data-Wiping Malware

Russia-aligned Sandworm deployed two data-wiping malware strains—ZEROLOT and Sting. The malware campaigns have targeted critical sectors including governmental entities, energy infrastructure, logistics providers, and notably, the grain sector.
November 7, 2025

Cavalry Werewolf Launches Cyberattack on Government Agencies to Deploy Network Backdoor

A sophisticated cyberattack campaign has been attributed to the threat actor group Cavalry Werewolf, targeting government agencies with the intent to steal sensitive data and establish persistent access within critical infrastructure networks.

Google Issues Emergency Chrome Update to Fix Critical RCE Flaw

Google has issued an emergency security update for Chrome across all major platforms, addressing five critical and medium-severity vulnerabilities. The update includes versions 142.0.7444.134 and 142.0.7444.135 for Windows, Mac, and Linux.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags