Category: GBHackers

OpenAI Introduces Aardvark, an AI Security Agent Powered by GPT-5
03
Nov
2025

OpenAI Introduces Aardvark, an AI Security Agent Powered by GPT-5

OpenAI has announced the launch of Aardvark, an autonomous AI security agent powered by GPT-5 that aims to revolutionize how…

What Rural Internet Providers Offer Remote Communities - GBHackers Security
02
Nov
2025

What Rural Internet Providers Offer Remote Communities – GBHackers Security

Loss of internet access in rural areas is considerably more serious, as it disrupts education, work, and communication. Despite such…

New Email Security Technique Prevents Phishing Attacks Behind NPM Breach
01
Nov
2025

New Email Security Technique Prevents Phishing Attacks Behind NPM Breach

The discovery of a large-scale NPM ecosystem compromise in September 2025 has renewed focus on email security as the critical…

Akira Ransomware Strikes Apache OpenOffice, Allegedly Exfiltrates 23GB of Data
01
Nov
2025

Akira Ransomware Strikes Apache OpenOffice, Allegedly Exfiltrates 23GB of Data

The notorious Akira ransomware gang announced on October 29, 2025, that it successfully penetrated the systems of Apache OpenOffice, claiming…

Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents
01
Nov
2025

Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents

In October 2025, cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated malware campaign distributing weaponized ZIP…

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks
01
Nov
2025

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks

The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities catalog,…

Cisco IOS XE Vulnerability Being Abused in the Wild to Plant BADCANDY
01
Nov
2025

Cisco IOS XE Vulnerability Being Abused in the Wild to Plant BADCANDY

Cybersecurity authorities are raising urgent alarms as threat actors continue to exploit a critical vulnerability in Cisco IOS XE devices,…

CISA Issues Advisory on XWiki Flaw Allowing Remote Code Execution
31
Oct
2025

CISA Issues Advisory on XWiki Flaw Allowing Remote Code Execution

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting XWiki Platform to its Known Exploited Vulnerabilities…

Google Launches New AI Security Features on Android to Block Mobile Scams
31
Oct
2025

Google Launches New AI Security Features on Android to Block Mobile Scams

Google has announced enhanced artificial intelligence protections designed to combat the rising tide of mobile scams affecting billions of users…

Attackers Exploit Windows Server Update Services Flaw to Steal Sensitive Organizational Data
31
Oct
2025

Attackers Exploit Windows Server Update Services Flaw to Steal Sensitive Organizational Data

Sophos researchers have identified real-world exploitation of a newly disclosed vulnerability in Windows Server Update Services (WSUS), where threat actors…

Stolen Credentials Drive the Rise of Financially Motivated Cyberattacks
31
Oct
2025

Stolen Credentials Drive the Rise of Financially Motivated Cyberattacks

Throughout the first half of 2025, the FortiGuard Incident Response team investigated dozens of security breaches across multiple industries driven…

Beware of Fake ChatGPT Apps That Spy on Users and Steal Sensitive Data
31
Oct
2025

Beware of Fake ChatGPT Apps That Spy on Users and Steal Sensitive Data

The proliferation of artificial intelligence applications has created unprecedented opportunities for cybercriminals to exploit user trust through deceptive mobile apps….