Category: GBHackers

"Power Parasites" Phishing Campaign Targets Energy Firms and Major Brands
25
Apr
2025

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed “Power Parasites,” targeting prominent energy companies and…

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs
25
Apr
2025

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce and Anubis ransomware operators in 2025….

Russian Hackers Attempt to Sabotage Digital Control Systems of Dutch Public Service
25
Apr
2025

Russian Hackers Attempt to Sabotage Digital Control Systems of Dutch Public Service

The Dutch Defense Ministry has revealed that critical infrastructure, democratic processes, and North Sea installations in the Netherlands have become…

FBI Offers $10 Million Reward for informationon Salt Typhoon Hackers
25
Apr
2025

FBI Offers $10 Million Reward for informationon Salt Typhoon Hackers

The Federal Bureau of Investigation (FBI), in partnership with the U.S. Department of State, has announced a reward of up…

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords
25
Apr
2025

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok’s user database, allegedly leaking login information for over 900,000…

7 Best Third-Party Risk Management Software in 2025
25
Apr
2025

7 Best Third-Party Risk Management Software in 2025

Whether you operate a small business or run a large enterprise, you rely on third-party suppliers, merchants or software providers….

25
Apr
2025

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok’s user database, allegedly leaking login information for over 900,000…

Chrome UAF Process Vulnerabilities Actively Exploited
25
Apr
2025

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser process were actively exploited in the…

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision
25
Apr
2025

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision

The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks, driven by generative AI (GenAI). By…

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access
25
Apr
2025

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to deploy malicious tools like Ammyy Admin…

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to publish
25
Apr
2025

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive documents from hundreds of organizations, following…

A New Toolkit Bypasses Microsoft Office 365 MFA Security
25
Apr
2025

A New Toolkit Bypasses Microsoft Office 365 MFA Security

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…