Category: GBHackers

Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment
01
May
2025

Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment

Commvault, a global leader in data protection and information management, has confirmed that a sophisticated cyberattack involving a zero-day vulnerability…

Tor Browser 14.5.1 Released with Enhanced Security and New Features
01
May
2025

Tor Browser 14.5.1 Released with Enhanced Security and New Features

The Tor Project has announced the official release of Tor Browser 14.5.1, introducing a host of security improvements and new…

TheWizards Deploy 'Spellbinder' for Global Adversary-in-the-Middle Assaults
01
May
2025

TheWizards Deploy ‘Spellbinder’ for Global Adversary-in-the-Middle Assaults

ESET researchers have uncovered sophisticated attack techniques employed by a China-aligned threat actor dubbed “TheWizards,” which has been actively targeting…

Security Policy Development Codifying NIST CSF For Enterprise Adoption
30
Apr
2025

Security Policy Development Codifying NIST CSF For Enterprise Adoption

The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) has become a fundamental reference for organizations aiming to…

Mitigating Insider Threats - A CISO's Practical Approach
30
Apr
2025

Mitigating Insider Threats – A CISO’s Practical Approach

Insider threats represent one of the most challenging cybersecurity risks facing organizations today, with incidents on the rise and costs…

The CISO’s Guide to Effective Cloud Security Strategies
30
Apr
2025

The CISO’s Guide to Effective Cloud Security Strategies

As organizations accelerate cloud adoption, CISOs face unprecedented challenges securing dynamic, multi-cloud environments. The shift to cloud-native architectures, hybrid workloads,…

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams
30
Apr
2025

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams

Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat actors in investment scams, which, according…

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens
30
Apr
2025

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace’s Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been exploiting legitimate Software-as-a-Service (SaaS) platforms like…

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks
30
Apr
2025

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing Simulator, designed to empower organizations in…

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations
30
Apr
2025

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising strategies. Recent investigations have uncovered a…

How CISOs Can Strengthen Supply Chain Security in 2025
30
Apr
2025

How CISOs Can Strengthen Supply Chain Security in 2025

The responsibilities of Chief Information Security Officers (CISOs) are rapidly evolving as digital transformation and global interconnectivity reshape the modern…

Cato Networks macOS Client Vulnerability Enables Low-Privilege Code Execution
30
Apr
2025

Cato Networks macOS Client Vulnerability Enables Low-Privilege Code Execution

A critical vulnerability in Cato Networks’ widely used macOS VPN client has been disclosed, enabling attackers with limited access to…