Category: GBHackers

An LLM-Driven Malware for Dynamic Reconnaissance and Data Exfiltration
26
Sep
2025

An LLM-Driven Malware for Dynamic Reconnaissance and Data Exfiltration

A novel AI-driven threat leverages LLMs on Hugging Face to execute adaptive reconnaissance and data exfiltration in real time. Rather…

Critical Cisco Flaw Lets Remote Attackers Execute Code on Firewalls and Routers
26
Sep
2025

Critical Cisco Flaw Lets Remote Attackers Execute Code on Firewalls and Routers

Cisco published Security Advisory cisco-sa-http-code-exec-WmfP3h3O revealing a severe flaw in multiple Cisco platforms that handle HTTP-based management. Tracked as CVE-2025-20363,…

New XCSSET Malware Variant Targets macOS App Developers
26
Sep
2025

New XCSSET Malware Variant Targets macOS App Developers

Cybersecurity researchers have discovered an advanced variant of the XCSSET malware specifically targeting macOS developers through infected Xcode projects, introducing…

LockBit 5.0 Ransomware Targets Windows, Linux, and VMware ESXi Systems
26
Sep
2025

LockBit 5.0 Ransomware Targets Windows, Linux, and VMware ESXi Systems

Cybersecurity researchers at Trend Micro have discovered a new and dangerous variant of LockBit ransomware that targets Windows, Linux, and…

Salesforce AI Agent Vulnerability Lets Attackers Steal Sensitive Data
26
Sep
2025

Salesforce AI Agent Vulnerability Lets Attackers Steal Sensitive Data

Cybersecurity researchers at Noma Labs have discovered a critical vulnerability in Salesforce’s Agentforce AI platform that could allow attackers to…

Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk
25
Sep
2025

Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk

Living Security, a global leader in Human Risk Management (HRM), today announced the full speaker lineup for the Human Risk…

Hackers Use GitHub Notifications to Impersonate Y Combinator and Steal Wallet Funds
25
Sep
2025

Hackers Use GitHub Notifications to Impersonate Y Combinator and Steal Wallet Funds

A recent wave of sophisticated phishing attacks has targeted developers and startups by impersonating Y Combinator through GitHub notifications. Victims…

ZendTo Flaw Lets Attackers Bypass Security Controls to Access Sensitive Data
25
Sep
2025

ZendTo Flaw Lets Attackers Bypass Security Controls to Access Sensitive Data

A critical vulnerability in the popular file-sharing tool ZendTo allows authenticated users to traverse system paths and access or modify…

Cisco IOS/XE Vulnerability Allows Unauthorized Access to Confidential Data
25
Sep
2025

Cisco IOS/XE Vulnerability Allows Unauthorized Access to Confidential Data

 Cisco released an advisory describing a high-severity vulnerability (CVE-2025-20160) in its IOS and IOS XE platforms. The flaw stems from…

Chinese State-Sponsored Hackers Targeting Telecommunications Infrastructure to Steal Sensitive Data
25
Sep
2025

Chinese State-Sponsored Hackers Targeting Telecommunications Infrastructure to Steal Sensitive Data

Chinese state-sponsored cyber threat group Salt Typhoon has intensified long-term espionage operations against global telecommunications infrastructure, according to recent legal…

BQTLOCK Ransomware Attacking Windows Users Via Telegram to Encrypt Files and Delete Backup
25
Sep
2025

BQTLOCK Ransomware Attacking Windows Users Via Telegram to Encrypt Files and Delete Backup

Security researchers have uncovered a new Ransomware-as-a-Service (RaaS) strain named BQTLOCK that is actively targeting Windows users through Telegram channels…

Volvo Group Reports Data Breach Following Ransomware Attack on HR Vendor
25
Sep
2025

Volvo Group Reports Data Breach Following Ransomware Attack on HR Vendor

Volvo Group has disclosed that a recent ransomware attack on its human resources software provider, Miljödata, may have resulted in unauthorized access…