Category: GBHackers

Record-Breaking GreedyBear Attack Uses 650 Hacking Tools to Steal $1M from Victims
08
Aug
2025

Record-Breaking GreedyBear Attack Uses 650 Hacking Tools to Steal $1M from Victims

The threat actor group dubbed GreedyBear has orchestrated an industrial-scale operation blending malicious browser extensions, executable malware, and phishing infrastructure…

ChatGPT-5 Launches – Discover What’s New in the Next-Gen AI Agent
08
Aug
2025

ChatGPT-5 Launches – Discover What’s New in the Next-Gen AI Agent

OpenAI has officially launched ChatGPT-5, marking a significant leap forward in artificial intelligence technology with a revolutionary unified system that…

CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits
08
Aug
2025

CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has released ten industrial control systems (ICS) advisories on August 7, 2025, highlighting…

Amazon ECS Internal Protocol Exploited to Steal AWS Credentials from Other Tasks
08
Aug
2025

Amazon ECS Internal Protocol Exploited to Steal AWS Credentials from Other Tasks

Security researchers have disclosed a critical vulnerability in Amazon Elastic Container Service (ECS) that allows malicious containers to steal AWS…

US Confirms Takedown of BlackSuit Ransomware Behind 450+ Hacks
08
Aug
2025

US Confirms Takedown of BlackSuit Ransomware Behind 450+ Hacks

Federal law enforcement agencies have successfully dismantled the critical infrastructure of BlackSuit ransomware, a sophisticated cybercriminal operation that has compromised…

Malicious Go Packages Used by Threat Actors to Deploy Obfuscated Remote Payloads
08
Aug
2025

Malicious Go Packages Used by Threat Actors to Deploy Obfuscated Remote Payloads

Socket’s Threat Research Team has identified eleven malicious Go packages distributed via GitHub, with ten remaining active on the Go…

Over 60 Malicious RubyGems Packages Used to Steal Social Media and Marketing Credentials
08
Aug
2025

Over 60 Malicious RubyGems Packages Used to Steal Social Media and Marketing Credentials

Socket’s Threat Research Team has exposed a persistent campaign involving over 60 malicious RubyGems packages that masquerade as automation tools…

CISA Issues Urgent Advisory to Address Microsoft Exchange Flaw
08
Aug
2025

CISA Issues Urgent Advisory to Address Microsoft Exchange Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-02 on August 7, 2025, requiring federal agencies to…

Flipper Zero Dark Web Firmware Cracks Rolling Code Security in Modern Cars
08
Aug
2025

Flipper Zero Dark Web Firmware Cracks Rolling Code Security in Modern Cars

Security researchers have discovered alarming new firmware for the popular Flipper Zero device that can completely bypass the rolling code…

Retbleed Vulnerability Exploited to Access Any Process’s Memory on Newer CPUs
08
Aug
2025

Retbleed Vulnerability Exploited to Access Any Process’s Memory on Newer CPUs

Security researchers have successfully demonstrated a sophisticated exploit of the Retbleed vulnerability, a critical CPU security flaw that allows attackers to…

HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks
07
Aug
2025

HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks

Researchers at Cyata have disclosed nine previously unknown zero-day vulnerabilities in HashiCorp Vault, a widely adopted open-source secrets management platform,…

How Machine Learning Detects Living off the Land (LotL) Attacks
07
Aug
2025

How Machine Learning Detects Living off the Land (LotL) Attacks

Elite cybercriminals prefer LotL attacks because they’re incredibly hard to spot. Instead of deploying obvious malware, attackers use the same…