Category: GBHackers

Securing Windows Endpoints Using Group Policy Objects (GPOs): A Configuration Guide
10
May
2025

Securing Windows Endpoints Using Group Policy Objects (GPOs): A Configuration Guide

Securing Windows endpoints is a top priority for organizations seeking to protect sensitive data and maintain operational integrity. Group Policy…

Detecting Backdoors in Enterprise Networks
10
May
2025

Detecting Backdoors in Enterprise Networks

In today’s rapidly evolving cybersecurity landscape, enterprise networks face a particularly insidious threat: backdoors, making detecting backdoors crucial. These clandestine…

Phishing Scams on the Rise with Sophisticated PhaaS Toolkits and Realistic Fake Pages
10
May
2025

Phishing Scams on the Rise with Sophisticated PhaaS Toolkits and Realistic Fake Pages

Cybersecurity experts are raising alarms over the proliferation of increasingly sophisticated phishing techniques that leverage dedicated Phishing-as-a-Service (PhaaS) toolkits to…

Critical Azure and Power Apps Vulnerabilities Allow Privilege Escalation for Attackers
10
May
2025

Critical Azure and Power Apps Vulnerabilities Allow Privilege Escalation for Attackers

Microsoft has patched four critical security vulnerabilities affecting its Azure cloud services and Power Apps platform that could allow attackers…

Chrome 137 Integrates Gemini Nano AI to Combat Tech Support Scams
10
May
2025

Chrome 137 Integrates Gemini Nano AI to Combat Tech Support Scams

Google has unveiled a groundbreaking defense mechanism in Chrome 137, integrating its on-device Gemini Nano large language model (LLM) to…

Why CISOs Must Prioritize Cybersecurity Culture in Remote Work
10
May
2025

Why CISOs Must Prioritize Cybersecurity Culture in Remote Work

In the era of remote and hybrid work, Chief Information Security Officers (CISOs) are now tasked with cultivating a strong…

North Korea’s OtterCookie Malware Added a New Feature to Attack Windows, Linux, and macOS
10
May
2025

North Korea’s OtterCookie Malware Added a New Feature to Attack Windows, Linux, and macOS

A North Korea-linked attack group, known as WaterPlum (also referred to as Famous Chollima or PurpleBravo), has been actively targeting…

New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads
09
May
2025

New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads

An advanced supply chain attack has targeted the well-known npm package rand-user-agent, which receives about 45,000 downloads every week, in…

Threat Actors Target Job Seekers with Three New Unique Adversaries
09
May
2025

Threat Actors Target Job Seekers with Three New Unique Adversaries

Netcraft has uncovered a sharp rise in recruitment scams in 2024, driven by three distinct threat actors employing unique and…

Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks
09
May
2025

Hackers Weaponizing Facebook Ads to Deploy Multi-Stage Malware Attacks

A persistent and highly sophisticated malvertising campaign on Facebook has been uncovered by Bitdefender Labs, exploiting the trust associated with…

New Stealthy .NET Malware Hiding Malicious Payloads within bitmap resources
09
May
2025

New Stealthy .NET Malware Hiding Malicious Payloads within bitmap resources

Cybersecurity researchers at Palo Alto Networks’ Unit 42 have uncovered a novel obfuscation method employed by threat actors to conceal…

Cyberattackers Targeting IT Help Desks for Initial Breach
09
May
2025

Cyberattackers Targeting IT Help Desks for Initial Breach

Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into granting access to critical systems, according…