Category: GBHackers

PromptFix Exploit Forces AI Browsers to Execute Hidden Malicious Commands
21
Aug
2025

PromptFix Exploit Forces AI Browsers to Execute Hidden Malicious Commands

Cybersecurity researchers have uncovered critical vulnerabilities in AI-powered browsers that allow attackers to manipulate artificial intelligence agents into executing malicious…

RingReaper Malware Targets Linux Servers, Stealthily Evading EDR Solutions
21
Aug
2025

RingReaper Malware Targets Linux Servers, Stealthily Evading EDR Solutions

A new malware campaign dubbed RingReaper has emerged, targeting servers with advanced post-exploitation capabilities that exploit the kernel’s io_uring asynchronous…

Google Unveils Enhanced Features to Empower Defenders and Strengthen AI Security
20
Aug
2025

Google Unveils Enhanced Features to Empower Defenders and Strengthen AI Security

Google Cloud has announced a suite of advanced security enhancements at the 2025 Security Summit, aimed at fortifying AI ecosystems…

Threat Actors Impersonate as Google support to sniff out Your login credentials
20
Aug
2025

Threat Actors Impersonate as Google support to sniff out Your login credentials

Threat actors are posing as Google support agents in an increasing number of complex social engineering attacks in order to…

A New Malware Loader Spreading Infostealers and Remote Access Trojans (RATs)
20
Aug
2025

A New Malware Loader Spreading Infostealers and Remote Access Trojans (RATs)

IBM X-Force has tracked QuirkyLoader, a sophisticated loader malware deployed by threat actors to distribute prominent families such as Agent…

Ransomware Attacks in Japan Surge by 1.4 Times, Signaling a Significant Increase in Cyber Threats
20
Aug
2025

Ransomware Attacks in Japan Surge by 1.4 Times, Signaling a Significant Increase in Cyber Threats

Japan saw a significant increase in ransomware attacks in the first half of 2025, with incidences increasing by about 1.4…

Threat Actors Exploit GenAI Platforms to Craft Sophisticated and Realistic Phishing Attacks
20
Aug
2025

Threat Actors Exploit GenAI Platforms to Craft Sophisticated and Realistic Phishing Attacks

The proliferation of generative AI (GenAI) platforms has revolutionized web-based services, enabling rapid code assistance, natural language processing, chatbot deployment,…

Kubernetes Capsule Vulnerability Enables Attackers to Inject Arbitrary Labels
20
Aug
2025

Kubernetes Capsule Vulnerability Enables Attackers to Inject Arbitrary Labels

Security researchers have disclosed a critical vulnerability in Kubernetes Capsule v0.10.3 and earlier versions that allows authenticated tenant users to…

Scaly Wolf Unleashing Attacks to Expose Organizations' Hidden Secrets
20
Aug
2025

Scaly Wolf Unleashing Attacks to Expose Organizations’ Hidden Secrets

The Scaly Wolf advanced persistent threat (APT) gang has once again targeted a Russian engineering company in a sophisticated targeted…

Serial Hacker Sentenced for Defacing and Hacking Organizational Websites
20
Aug
2025

Serial Hacker Sentenced for Defacing and Hacking Organizational Websites

Al-Tahery Al-Mashriky, 26, of Rotherham, South Yorkshire, was given a 20-month prison sentence for several charges of illegal computer access…

CERT/CC Issues Alert on Critical Flaws in Workhorse Municipal Accounting Software
20
Aug
2025

CERT/CC Issues Alert on Critical Flaws in Workhorse Municipal Accounting Software

The Computer Emergency Response Team Coordination Center (CERT/CC) has issued a critical security advisory warning of severe vulnerabilities in Workhorse…

Copilot Vulnerability Lets Attackers Bypass Audit Logs and Gain Hidden Access
20
Aug
2025

Copilot Vulnerability Lets Attackers Bypass Audit Logs and Gain Hidden Access

A critical vulnerability in Microsoft’s M365 Copilot allowed users to access sensitive files without leaving any trace in audit logs,…