Category: GBHackers

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems
16
Apr
2025

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted European strategic industries since at least…

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats
16
Apr
2025

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a sophisticated initial-stage downloader, launched by the…

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities
16
Apr
2025

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing severe vulnerabilities in widely-used Industrial Control…

10 Best Email Security Solutions in 2025
16
Apr
2025

10 Best Email Security Solutions in 2025

Email security solutions are critical for protecting organizations from the growing sophistication of cyber threats targeting email communication. As email…

SOC Alert Fatigue Hits Peak Levels As Teams Battle Notification Overload
16
Apr
2025

SOC Alert Fatigue Hits Peak Levels As Teams Battle Notification Overload

Security Operations Centers (SOCs) are facing a mounting crisis: alert fatigue. As cyber threats multiply and security tools proliferate, SOC…

Hackers Exploit Node.js to Spread Malware and Exfiltrate Data
16
Apr
2025

Hackers Exploit Node.js to Spread Malware and Exfiltrate Data

Threat actors are increasingly targeting Node.js—a staple tool for modern web developers—to launch sophisticated malware campaigns aimed at data theft…

MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure
16
Apr
2025

MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure

A leaked internal memo dated April 15, 2025, has sent shockwaves through the cybersecurity community, revealing that MITRE’s contract to…

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility
16
Apr
2025

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility

Zeek, formerly known as Bro, has established itself as a leading open-source network security monitoring platform. As organizations face increasingly…

DOGE 'Big Balls' Ransomware Utilizes ZIP-Based LNK Shortcuts and BYOVD Techniques for Stealthy Attacks
15
Apr
2025

DOGE ‘Big Balls’ Ransomware Utilizes ZIP-Based LNK Shortcuts and BYOVD Techniques for Stealthy Attacks

A new and highly sophisticated ransomware campaign, dubbed “DOGE BIG BALLS Ransomware,” has recently come to light, demonstrating a blend…

Cybercriminals Exploit EC2 Instance Metadata Vulnerability to Launch Attacks on Hosted Websites
15
Apr
2025

Cybercriminals Exploit EC2 Instance Metadata Vulnerability to Launch Attacks on Hosted Websites

Cybercriminals have launched a sophisticated campaign targeting websites hosted on Amazon Web Services (AWS) EC2 instances. This campaign, observed in…

ChatGPT Image Generator Abused for Fake Passport Production
15
Apr
2025

ChatGPT Image Generator Abused for Fake Passport Production

OpenAI’s ChatGPT image generator has been exploited to create convincing fake passports in mere minutes, highlighting a significant vulnerability in…

Unmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript Loader
15
Apr
2025

Unmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript Loader

Security researchers are analyzing a sophisticated malware delivery mechanism that uses a JScript loader to deploy different payloads based on…