Category: GBHackers

Splunk Unveils PLoB Tool to Detect Compromised Credential Usage
07
Aug
2025

Splunk Unveils PLoB Tool to Detect Compromised Credential Usage

Splunk has introduced PLoB (Post-Logon Behaviour Fingerprinting and Detection) in a world where compromised credentials remain the primary vector for…

Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems
07
Aug
2025

Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems

Threat actors are increasingly using Scalable Vector Graphics (SVG) files to get beyond traditional defenses in the quickly developing field…

Gemini AI Exploited via Google Invite Prompt Injection to Steal Sensitive User Data
07
Aug
2025

Gemini AI Exploited via Google Invite Prompt Injection to Steal Sensitive User Data

Security researchers have discovered a series of critical vulnerabilities in Google’s Gemini AI assistant that allow attackers to exploit the…

Weaponizing Microsoft 365 Direct Send to Bypass Email Security Defenses
07
Aug
2025

Weaponizing Microsoft 365 Direct Send to Bypass Email Security Defenses

Security researchers at StrongestLayer, in collaboration with Jeremy, a seasoned Security Architect at a major manufacturing firm, have exposed a…

Hacker Extradited to U.S. for $2.5 Million Tax Fraud Scheme
07
Aug
2025

Hacker Extradited to U.S. for $2.5 Million Tax Fraud Scheme

Chukwuemeka Victor Amachukwu, also known as Chukwuemeka Victor Eletuo and So Kwan Leung, was extradited from France to the United…

ScarCruft Hacker Group Launches New Rust-Based Malware Attack Leveraging PubNub
07
Aug
2025

ScarCruft Hacker Group Launches New Rust-Based Malware Attack Leveraging PubNub

The North Korean state-sponsored advanced persistent threat (APT) group known as ScarCruft has been linked to a sophisticated malware campaign…

Weaponized npm Packages Target WhatsApp Developers with Remote Kill Switch
07
Aug
2025

Weaponized npm Packages Target WhatsApp Developers with Remote Kill Switch

Socket’s Threat Research Team has uncovered a sophisticated supply chain attack targeting developers integrating with the WhatsApp Business API. Two…

CISA Warns of ‘ToolShell’ Exploitation Chain Targeting SharePoint Servers; IOCs and Detections Released
07
Aug
2025

CISA Warns of ‘ToolShell’ Exploitation Chain Targeting SharePoint Servers; IOCs and Detections Released

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding an exploitation chain dubbed “ToolShell” targeting on-premises…

IRGC-Linked Hackers Target Financial, Government, and Media Organizations
07
Aug
2025

IRGC-Linked Hackers Target Financial, Government, and Media Organizations

A sophisticated network of hackers with ties to Iran’s Islamic Revolutionary Guard Corps (IRGC) unleashed a barrage of cyber-operations designed…

Hackers Exploit Legitimate Drivers to Disable Antivirus and Weaken System Defenses
07
Aug
2025

Hackers Exploit Legitimate Drivers to Disable Antivirus and Weaken System Defenses

Threat actors have been deploying a novel antivirus (AV) killer since at least October 2024, leveraging the legitimate ThrottleStop.sys driver…

SocGholish Uses Parrot and Keitaro TDS to Spread Malware via Fake Updates
07
Aug
2025

SocGholish Uses Parrot and Keitaro TDS to Spread Malware via Fake Updates

SocGholish, operated by the threat actor group TA569, has solidified its role as a prominent Malware-as-a-Service (MaaS) provider, functioning as…

Akamai Ghost Platform Flaw Allows Hidden Second Request Injection
07
Aug
2025

Akamai Ghost Platform Flaw Allows Hidden Second Request Injection

Akamai Technologies disclosed a critical HTTP request smuggling vulnerability affecting its content delivery network platform that could allow attackers to…