Category: GBHackers

Battering RAM Exploit Bypasses Modern Protections in Intel, AMD Cloud Processors
01
Oct
2025

Battering RAM Exploit Bypasses Modern Protections in Intel, AMD Cloud Processors

Cloud providers rely on hardware-based memory encryption to keep user data safe. This encryption shields sensitive information like passwords, financial…

Red Hat OpenShift AI Vulnerability Lets Attackers Seize Infrastructure Control
01
Oct
2025

Red Hat OpenShift AI Vulnerability Lets Attackers Seize Infrastructure Control

A serious vulnerability in the Red Hat OpenShift AI service (RHOAI) enables attackers with minimal access to escalate privileges and…

Google Publishes Security Hardening Guide to Counter UNC6040 Threats
01
Oct
2025

Google Publishes Security Hardening Guide to Counter UNC6040 Threats

Google’s Threat Intelligence Group (GTIG) has published a comprehensive guide to help organizations strengthen their SaaS security posture—particularly Salesforce—against UC6040’s…

Cisco IOS/IOS XE SNMP Vulnerabilities Exploited in Ongoing Attacks, Warns CISA
01
Oct
2025

Cisco IOS/IOS XE SNMP Vulnerabilities Exploited in Ongoing Attacks, Warns CISA

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about critical vulnerabilities in Cisco’s IOS and IOS XE…

Microsoft Sentinel Launches AI-Driven Agentic SIEM Platform for Enterprise Security
01
Oct
2025

Microsoft Sentinel Launches AI-Driven Agentic SIEM Platform for Enterprise Security

Organizations face an ever-evolving cyberthreat landscape marked by faster, more complex attacks. Today, Microsoft is answering this call with the…

MatrixPDF Campaign Evades Gmail Filters to Deliver Malicious Payloads
01
Oct
2025

MatrixPDF Campaign Evades Gmail Filters to Deliver Malicious Payloads

Cybercriminals are turning a trusted file format against users in a sophisticated new attack campaign. MatrixPDF represents a concerning evolution…

Hackers Actively Probe Palo Alto PAN-OS GlobalProtect Vulnerability for Exploitation
30
Sep
2025

Hackers Actively Probe Palo Alto PAN-OS GlobalProtect Vulnerability for Exploitation

An uptick in internet-wide scanning activity indicates that threat actors are actively probing for systems vulnerable to CVE-2024-3400, a critical GlobalProtect…

New Android Banking Trojan Uses Hidden VNC for Full Remote Control of Devices
30
Sep
2025

New Android Banking Trojan Uses Hidden VNC for Full Remote Control of Devices

In late August 2025, Cleafy’s Threat Intelligence team uncovered Klopatra, a new, highly sophisticated Android banking trojan and Remote Access…

Hackers Use Cellular Router API to Send Malicious SMS with Weaponized Links
30
Sep
2025

Hackers Use Cellular Router API to Send Malicious SMS with Weaponized Links

The monitoring and analysis of vulnerability exploitations are among the primary responsibilities of Sekoia.io’s Threat Detection & Research (TDR) team….

Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload
30
Sep
2025

Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload

Patchwork, the advanced persistent threat (APT) actor also known as Dropping Elephant, Monsoon, and Hangover Group, has been observed deploying…

New Chinese Nexus APT Group Targeting Organizations to Deploy NET-STAR Malware Suite
30
Sep
2025

New Chinese Nexus APT Group Targeting Organizations to Deploy NET-STAR Malware Suite

China-linked advanced persistent threat (APT) group Phantom Taurus has intensified espionage operations against government and telecommunications targets across Africa, the…

Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details
30
Sep
2025

Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details

An emerging phishing campaign is targeting job seekers by masquerading as Google Careers recruiters, delivering seemingly legitimate emails that lead…