Category: GBHackers

AI-Powered Cyber Attacks Utilize ML Algorithms to Deploy Malware and Circumvent Traditional Security
24
Jul
2025

AI-Powered Cyber Attacks Utilize ML Algorithms to Deploy Malware and Circumvent Traditional Security

Artificial intelligence (AI) and machine learning (ML) are enabling hackers to plan extremely complex assaults that surpass conventional defenses in…

Hive0156 Hackers Targeting Government and Military Organizations to Deploy REMCOS RAT
24
Jul
2025

Hive0156 Hackers Targeting Government and Military Organizations to Deploy REMCOS RAT

IBM X-Force researchers have identified ongoing cyber campaigns by Hive0156, a Russian-aligned threat actor, systematically targeting Ukrainian government and military…

Surge in Phishing Attacks Exploiting Spoofed SharePoint Domains and Sneaky 2FA Tactics
24
Jul
2025

Surge in Phishing Attacks Exploiting Spoofed SharePoint Domains and Sneaky 2FA Tactics

Cybersecurity researchers have observed a significant uptick in phishing campaigns that leverage domains designed to impersonate Microsoft SharePoint, employing highly…

UNC3944 Exploits VMware vSphere to Deploy Ransomware and Steal Data from Organizations
24
Jul
2025

UNC3944 Exploits VMware vSphere to Deploy Ransomware and Steal Data from Organizations

The Google Threat Intelligence Group has uncovered a highly advanced cyber operation orchestrated by the threat actor UNC3944, also linked…

Elephant APT Group Exploits VLC Player and Encrypted Shellcode in Attacks on Defense Sector
24
Jul
2025

Elephant APT Group Exploits VLC Player and Encrypted Shellcode in Attacks on Defense Sector

Arctic Wolf Labs has uncovered a sophisticated cyber-espionage operation attributed to the Dropping Elephant advanced persistent threat (APT) group, also…

Threat Actors Using .hwp Files to Distribute RokRAT Malware and Evade Detection Mechanisms
24
Jul
2025

Threat Actors Using .hwp Files to Distribute RokRAT Malware and Evade Detection Mechanisms

The AhnLab Security intelligence Center (ASEC) has identified a sophisticated campaign where threat actors are leveraging Hangul Word Processor (.hwp)…

NoName057(16) Hackers Target 3,700 Unique Devices Over the Last 13 Months
24
Jul
2025

NoName057(16) Hackers Target 3,700 Unique Devices Over the Last 13 Months

The pro-Russian hacktivist collective NoName057(16) has been documented executing distributed denial-of-service (DDoS) attacks against over 3,700 unique hosts, predominantly targeting…

Splunk Guide to Detect, Mitigate, and Respond to the CitrixBleed 2 Vulnerability
24
Jul
2025

Splunk Guide to Detect, Mitigate, and Respond to the CitrixBleed 2 Vulnerability

The cybersecurity landscape is grappling with CVE-2025-5777, informally known as “CitrixBleed 2,” an out-of-bounds memory read vulnerability affecting Citrix NetScaler…

SonicWall SMA 100 Vulnerabilities Allow Remote Execution of Arbitrary JavaScript
24
Jul
2025

SonicWall SMA 100 Vulnerabilities Allow Remote Execution of Arbitrary JavaScript

Cybersecurity vendor SonicWall issued a critical advisory highlighting three serious vulnerabilities affecting its Secure Mobile Access (SMA) 100 series appliances….

GitLab Publishes Security Update Addressing Several Vulnerabilities
24
Jul
2025

GitLab Publishes Security Update Addressing Several Vulnerabilities

GitLab has released critical security patches addressing six vulnerabilities across its Community Edition (CE) and Enterprise Edition (EE) platforms, with…

Researchers Exploit Cursor Background Agents to Take Over Amazon EC2 Instance
24
Jul
2025

Researchers Exploit Cursor Background Agents to Take Over Amazon EC2 Instance

Security researchers have successfully exploited vulnerabilities in Cursor’s Background Agents to gain unauthorized access to an Amazon EC2 instance, demonstrating…

AI-Driven Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy
24
Jul
2025

AI-Driven Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy

Researchers have introduced WhoFi, an AI-powered deep learning pipeline that leverages Wi-Fi Channel State Information (CSI) for person re-identification (Re-ID),…