Category: GBHackers

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens
30
Apr
2025

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace’s Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been exploiting legitimate Software-as-a-Service (SaaS) platforms like…

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks
30
Apr
2025

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing Simulator, designed to empower organizations in…

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations
30
Apr
2025

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising strategies. Recent investigations have uncovered a…

How CISOs Can Strengthen Supply Chain Security in 2025
30
Apr
2025

How CISOs Can Strengthen Supply Chain Security in 2025

The responsibilities of Chief Information Security Officers (CISOs) are rapidly evolving as digital transformation and global interconnectivity reshape the modern…

Cato Networks macOS Client Vulnerability Enables Low-Privilege Code Execution
30
Apr
2025

Cato Networks macOS Client Vulnerability Enables Low-Privilege Code Execution

A critical vulnerability in Cato Networks’ widely used macOS VPN client has been disclosed, enabling attackers with limited access to…

Researchers Uncovered RansomHub operation and it's Relation With Qilin ransomware
30
Apr
2025

Researchers Uncovered RansomHub operation and it’s Relation With Qilin ransomware

Security researchers have identified significant connections between two major ransomware-as-a-service (RaaS) operations, with evidence suggesting affiliates from the recently-disabled RansomHub…

New WordPress Malware Disguised as Anti-Malware Plugin Takes Full Control of Websites
30
Apr
2025

New WordPress Malware Disguised as Anti-Malware Plugin Takes Full Control of Websites

The Wordfence Threat Intelligence team has identified a new strain of WordPress malware that masquerades as a legitimate plugin, often…

Firefox 138 Launches with Patches for Several High-Severity Flaws
30
Apr
2025

Firefox 138 Launches with Patches for Several High-Severity Flaws

Mozilla has officially released Firefox 138, marking a significant update focused on user security. The new version addresses multiple high-severity…

Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions
30
Apr
2025

Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

A newly disclosed vulnerability in Microsoft’s Telnet Server component is making headlines after researchers revealed that attackers could exploit the…

Link11 brings three brands together on one platform with new branding
30
Apr
2025

Link11 brings three brands together on one platform with new branding

Link11 has fully integrated DOSarrest and Reblaze to become one of Europe’s leading providers of network security, web application security,…

Anthropic Report Reveals Growing Risks from Misuse of Generative AI Misuse
30
Apr
2025

Anthropic Report Reveals Growing Risks from Misuse of Generative AI Misuse

A recent threat report from Anthropic, titled “Detecting and Countering Malicious Uses of Claude: March 2025,” published on April 24,…

Researchers Exploit OAuth Misconfigurations to Gain Unrestricted Access to Sensitive Data
30
Apr
2025

Researchers Exploit OAuth Misconfigurations to Gain Unrestricted Access to Sensitive Data

A security researcher has uncovered a serious vulnerability resulting from incorrectly configured OAuth2 credentials in a startling discovery from a…