RSS The Hacker News
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer May 19, 2025
    The official site for RVTools has been hacked to serve a compromised installer for the popular VMware environment reporting utility. "Robware.net and RVTools.com are currently offline. We are working expeditiously to restore service and appreciate your patience," the company said in a statement posted on its website. "Robware.net and RVTools.com are the only authorized and […]
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access May 19, 2025
    Several ransomware actors are using a malware called Skitnet as part of their post-exploitation efforts to steal sensitive data and establish remote control over compromised hosts. "Skitnet has been sold on underground forums like RAMP since April 2024," Swiss cybersecurity company PRODAFT told The Hacker News. "However, since early 2025, we have observed multiple ransomware […]
  • Why CTEM is the Winning Bet for CISOs in 2025 May 19, 2025
    Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs. No longer a theoretical framework, CTEM now anchors today’s cybersecurity programs by continuously aligning security efforts with real-world risk. At the heart of CTEM is the integration of Adversarial Exposure Validation (AEV), an advanced, offensive
  • Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards May 19, 2025
    Mozilla has released security updates to address two critical security flaws in its Firefox browser that could be potentially exploited to access sensitive data or achieve code execution. The vulnerabilities, both of which were exploited as a zero-day at Pwn2Own Berlin, are listed below - CVE-2025-4918 - An out-of-bounds access vulnerability when resolving Promise objects […]
  • ⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More May 19, 2025
    Cybersecurity leaders aren’t just dealing with attacks—they’re also protecting trust, keeping systems running, and maintaining their organization’s reputation. This week’s developments highlight a bigger issue: as we rely more on digital tools, hidden weaknesses can quietly grow.  Just fixing problems isn’t enough anymore—resilience needs to be built into everything from the ground up.
RSS GBHackers Security | #1 Globally Trusted Cyber Security News Platform
  • New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials May 19, 2025
    A newly identified phishing campaign is targeting unsuspecting users by masquerading as urgent Zoom meeting invitations from colleagues. This deceptive tactic leverages the familiarity and trust associated with workplace communications to lure victims into a trap designed to steal their login credentials. Cybersecurity researchers have flagged this attack for its realistic approach, which includes a […]
  • New Hannibal Stealer Uses Stealth and Obfuscation to Evade Detection May 19, 2025
    A newly identified piece of malware, dubbed the “Hannibal Stealer,” has emerged as a significant cybersecurity threat due to its advanced stealth mechanisms and obfuscation techniques designed to bypass modern detection systems. This modular .NET info-stealer and credential harvester demonstrates deep integration for extracting sensitive data from browsers, cryptocurrency wallets, and popular applications like Discord, […]
  • Chinese APT Hackers Target Organizations Using Korplug Loaders and Malicious USB Drives May 19, 2025
    Advanced persistent threat (APT) groups with ties to China have become persistent players in the cyber espionage landscape, with a special emphasis on European governmental and industrial entities, according to a thorough disclosure from ESET’s APT Activity Report for Q4 2024 to Q1 2025. The report, covering activities from October 2024 to March 2025, highlights […]
  • Cache Timing Techniques Used to Bypass Windows 11 KASLR and Reveal Kernel Base May 19, 2025
    Cache timing side-channel attacks have been used to circumvent Kernel Address Space Layout Randomization (KASLR) on fully updated Windows 11 PCs, which is a startling discovery for cybersecurity aficionados and Windows kernel developers. KASLR, a critical security mechanism, randomizes the memory location of the kernel base to thwart exploitation attempts. However, as detailed in a […]
  • Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems May 19, 2025
    Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known for its deep integration with Windows operating systems. Often compared to .NET for its persistence in malicious campaigns, AutoIT’s simplicity and ability to interact with Windows components make it a favored tool among cybercriminals. This weekend, a particularly intricate malware delivery […]