Category: GBHackers

HPE Performance Cluster Manager Vulnerability Enables Unauthorized Access
22
Apr
2025

HPE Performance Cluster Manager Vulnerability Enables Unauthorized Access

Hewlett Packard Enterprise (HPE) has disclosed a severe security flaw in its Performance Cluster Manager (HPCM) software that could allow…

Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models
22
Apr
2025

Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models

Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed “VibeScamming,” where cybercriminals are using AI tools to…

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations
22
Apr
2025

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates…

Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools
21
Apr
2025

Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools

The Akira ransomware group has intensified its operations, targeting over 350 organizations and claiming approximately $42 million USD in ransom…

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics
21
Apr
2025

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security measures and exfiltrate data or establish…

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs
21
Apr
2025

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean IT workers to infiltrate organizations globally…

Infostealer Attacks Surge 84% Weekly Through Phishing Emails
21
Apr
2025

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest…

New Phishing Technique Hides Weaponized HTML Files Within SVG Images
21
Apr
2025

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector Graphics) files for phishing attacks. These…

Cyber Hygiene Best Practices for Modern Enterprises
21
Apr
2025

Cyber Hygiene Best Practices for Modern Enterprises

Cyber hygiene refers to the routine practices and fundamental security measures organizations implement to maintain system health and improve security…

Cloud Security Challenges Every CISO Must Address in Hybrid Environments
21
Apr
2025

Cloud Security Challenges Every CISO Must Address in Hybrid Environments

Hybrid cloud environments, which blend on-premises infrastructure with public and private cloud services, have become the backbone of modern enterprises….

Security Awareness Metrics That Matter to the CISO
21
Apr
2025

Security Awareness Metrics That Matter to the CISO

In today’s rapidly evolving threat landscape, Chief Information Security Officers (CISOs) are tasked with more than just deploying the latest…

21
Apr
2025

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates…