Aggregator
Quicksilver v2: evolution of a globally distributed key-value store (Part 1)
UK NCA arrested four people over M&S, Co-op cyberattacks
Hackers Stolen $500,000 in Crypto Assets by Weaponizing AI Extension
A sophisticated cybercrime operation has successfully stolen $500,000 in cryptocurrency assets from a Russian blockchain developer through a malicious extension targeting the Cursor AI integrated development environment. The attack, which occurred in June 2025, represents a concerning evolution in supply chain attacks that exploit the growing popularity of AI-assisted development tools. The incident began when […]
The post Hackers Stolen $500,000 in Crypto Assets by Weaponizing AI Extension appeared first on Cyber Security News.
Alleged Sale of Verified Global Cryptocurrency User Database
Weaponized AI Extension Used by Hackers to Swipe $500,000 in Crypto
A Russian blockchain engineer lost over $500,000 in cryptocurrency holdings in June 2025 after being the victim of a carefully planned cyberattack, serving as a terrifying reminder of the perils that might exist in open-source ecosystems. The attack, investigated by cybersecurity experts, revealed the use of a malicious extension disguised as a legitimate tool for […]
The post Weaponized AI Extension Used by Hackers to Swipe $500,000 in Crypto appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Windows 11 now uses JScript9Legacy engine for improved security
Android Packer Ducex Employs Serious Obfuscation Techniques and Detects Analysis Tools Presence
The cybersecurity landscape continues to evolve with increasingly sophisticated malware variants, and a recent discovery highlights the persistent threat posed by advanced Android packers. Security researchers have identified a highly complex packer dubbed “Ducex,” which serves as a delivery mechanism for the notorious Triada Android malware. This Chinese-developed tool represents a significant advancement in mobile […]
The post Android Packer Ducex Employs Serious Obfuscation Techniques and Detects Analysis Tools Presence appeared first on Cyber Security News.
Weaponized Termius App Delivers Latest ZuRu Malware to macOS Users
A sophisticated variant of the macOS.ZuRu malware, first identified by a Chinese blogger in July 2021, has resurfaced with a new method of attack targeting macOS users through a trojanized version of the popular cross-platform SSH client Termius. Initially spread via poisoned Baidu search results for tools like iTerm2, SecureCRT, and Microsoft Remote Desktop for […]
The post Weaponized Termius App Delivers Latest ZuRu Malware to macOS Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
INC
You must login to view this content
INC
You must login to view this content
Ingram Micro Up and Running After Ransomware Attack
Ducex Packer for Android Evades Detection with Heavy Obfuscation Techniques
The team at ANY.RUN recently reviewed a powerful Android packer called Ducex, which is linked to the infamous Triada malware, and criticized it for its sophisticated obfuscation methods. First identified within a fake Telegram app, Ducex serves as a protective shell for Triada, one of the most sophisticated Android trojans since its debut in 2016. […]
The post Ducex Packer for Android Evades Detection with Heavy Obfuscation Techniques appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Думали: ДНК — чертёж жизни. Оказалось организмом управляет «мусор»
Schneider Electric Flaws Expose Systems to OS Command Injection Attacks
Schneider Electric, a global leader in industrial technology and sustainability, has issued a critical security notification revealing multiple vulnerabilities in its EcoStruxure IT Data Center Expert (DCE) software, a scalable monitoring solution for data center equipment. Released on July 8, 2025, under document reference SEVD-2025-189-01, the advisory details six severe flaws affecting versions 8.3 and […]
The post Schneider Electric Flaws Expose Systems to OS Command Injection Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands
Schneider Electric has disclosed a critical set of six vulnerabilities affecting its EcoStruxure IT Data Center Expert software that could allow attackers to execute remote code and gain unauthorized system access. The vulnerabilities, discovered in versions 8.3 and prior, present significant security risks to data center operations worldwide. The most severe vulnerability, tracked as CVE-2025-50121, […]
The post Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands appeared first on Cyber Security News.