Category: GBHackers

Google Chrome Uses Advanced AI to Combat Sophisticated Online Scams
11
May
2025

Google Chrome Uses Advanced AI to Combat Sophisticated Online Scams

Google has integrated artificial intelligence into its cybersecurity toolkit to shield users from financial and data theft scams. On Friday,…

DOGE Employee Computer Infected with Malware and Leaked Data Found Info-Stealer Logs
10
May
2025

DOGE Employee Computer Infected with Malware and Leaked Data Found Info-Stealer Logs

Kyle Schutt, a 37-year-old DOGE employee identified in federal payroll records, has had his personal email address and associated passwords…

Bluetooth Core 6.1 Released - What's New!
10
May
2025

Bluetooth Core 6.1 Released – What’s New!

Bluetooth SIG’s decision to transition to a bi-annual release cadence marks a strategic pivot toward fostering rapid iteration and market…

Securing Windows Endpoints Using Group Policy Objects (GPOs): A Configuration Guide
10
May
2025

Securing Windows Endpoints Using Group Policy Objects (GPOs): A Configuration Guide

Securing Windows endpoints is a top priority for organizations seeking to protect sensitive data and maintain operational integrity. Group Policy…

Detecting Backdoors in Enterprise Networks
10
May
2025

Detecting Backdoors in Enterprise Networks

In today’s rapidly evolving cybersecurity landscape, enterprise networks face a particularly insidious threat: backdoors, making detecting backdoors crucial. These clandestine…

Phishing Scams on the Rise with Sophisticated PhaaS Toolkits and Realistic Fake Pages
10
May
2025

Phishing Scams on the Rise with Sophisticated PhaaS Toolkits and Realistic Fake Pages

Cybersecurity experts are raising alarms over the proliferation of increasingly sophisticated phishing techniques that leverage dedicated Phishing-as-a-Service (PhaaS) toolkits to…

Critical Azure and Power Apps Vulnerabilities Allow Privilege Escalation for Attackers
10
May
2025

Critical Azure and Power Apps Vulnerabilities Allow Privilege Escalation for Attackers

Microsoft has patched four critical security vulnerabilities affecting its Azure cloud services and Power Apps platform that could allow attackers…

Chrome 137 Integrates Gemini Nano AI to Combat Tech Support Scams
10
May
2025

Chrome 137 Integrates Gemini Nano AI to Combat Tech Support Scams

Google has unveiled a groundbreaking defense mechanism in Chrome 137, integrating its on-device Gemini Nano large language model (LLM) to…

Why CISOs Must Prioritize Cybersecurity Culture in Remote Work
10
May
2025

Why CISOs Must Prioritize Cybersecurity Culture in Remote Work

In the era of remote and hybrid work, Chief Information Security Officers (CISOs) are now tasked with cultivating a strong…

North Korea’s OtterCookie Malware Added a New Feature to Attack Windows, Linux, and macOS
10
May
2025

North Korea’s OtterCookie Malware Added a New Feature to Attack Windows, Linux, and macOS

A North Korea-linked attack group, known as WaterPlum (also referred to as Famous Chollima or PurpleBravo), has been actively targeting…

New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads
09
May
2025

New Supply Chain Attack Compromises Popular npm Package with 45,000 Weekly Downloads

An advanced supply chain attack has targeted the well-known npm package rand-user-agent, which receives about 45,000 downloads every week, in…

Threat Actors Target Job Seekers with Three New Unique Adversaries
09
May
2025

Threat Actors Target Job Seekers with Three New Unique Adversaries

Netcraft has uncovered a sharp rise in recruitment scams in 2024, driven by three distinct threat actors employing unique and…