Category: GBHackers

SquareX Discloses Major Passkey Vulnerability at DEF CON 33
28
Aug
2025

SquareX Discloses Major Passkey Vulnerability at DEF CON 33

It is no secret that passwords are highly susceptible to phishing and brute force attacks. This led to the mass…

Anthropic Blocks Hackers Attempting to Exploit Claude AI for Cyber Attacks
28
Aug
2025

Anthropic Blocks Hackers Attempting to Exploit Claude AI for Cyber Attacks

Anthropic, a leading AI research company, has successfully disrupted multiple attempts by cybercriminals to misuse its Claude AI model for…

State of Nevada Faces IT Outage Amid Cyberattack, Offices Suspended
28
Aug
2025

State of Nevada Faces IT Outage Amid Cyberattack, Offices Suspended

The State of Nevada became the target of a significant cyberattack which resulted in a substantial network security incident impacting…

How SafeLine WAF Turns Hackers’ Scanners into Trash
28
Aug
2025

How SafeLine WAF Turns Hackers’ Scanners into Trash

When web application protection is no longer a million-dollar luxury, and when every developer can build their own security perimeter…

Cisco IMC Virtual Keyboard Vulnerability Allows Attackers to Redirect Users to Malicious Websites
28
Aug
2025

Cisco IMC Virtual Keyboard Vulnerability Allows Attackers to Redirect Users to Malicious Websites

Cisco has released urgent security updates to remediate a high-severity vulnerability in its Integrated Management Controller (IMC) virtual keyboard video…

Cisco UCS Manager Software Flaw Allows Attackers to Inject Malicious Commands
28
Aug
2025

Cisco UCS Manager Software Flaw Allows Attackers to Inject Malicious Commands

Cisco has released urgent security updates to remediate two medium-severity command injection vulnerabilities in its UCS Manager Software that could…

Threat Actors Exploit Velociraptor Incident Response Tool for Remote Access
28
Aug
2025

Threat Actors Exploit Velociraptor Incident Response Tool for Remote Access

Researchers from the Counter Threat Unit (CTU) at Sophos uncovered a sophisticated intrusion where threat actors repurposed the legitimate open-source…

Electronics Manufacturer Data I/O Suffers Ransomware Breach
28
Aug
2025

Electronics Manufacturer Data I/O Suffers Ransomware Breach

Data I/O Corporation, a well-known electronics firm that specializes in device programming and security provisioning solutions, revealed a ransomware attack…

Lazarus Group Targets Windows 11 with ClickFix Tactics and Fake Job Offers
28
Aug
2025

Lazarus Group Targets Windows 11 with ClickFix Tactics and Fake Job Offers

The notorious Lazarus advanced persistent threat (APT) organization, which Qi’anxin internally tracks as APT-Q-1, has been seen using the ClickFix…

ShadowSilk Targets Penetration-Testing Tools and Public Exploits to Breach Organizations
28
Aug
2025

ShadowSilk Targets Penetration-Testing Tools and Public Exploits to Breach Organizations

Cybersecurity experts discovered an advanced persistent threat (APT) cluster called ShadowSilk in a thorough research published by Group-IB. Since at…

U.S. Treasury Sanctions North Korean IT Worker Network Funding Weapons Programs
28
Aug
2025

U.S. Treasury Sanctions North Korean IT Worker Network Funding Weapons Programs

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has imposed sanctions on Russian national Vitaliy Sergeyevich…

New Research Explores Emulating Scattered Spider Tactics in Real-World Scenarios
28
Aug
2025

New Research Explores Emulating Scattered Spider Tactics in Real-World Scenarios

Experts have described methods for mimicking the strategies of the advanced persistent threat (APT) group Scattered Spider in a recent…