Category: GBHackers

Apache Parquet Java Vulnerability Enables Remote Code Execution
05
May
2025

Apache Parquet Java Vulnerability Enables Remote Code Execution

A high-severity vulnerability (CVE-2025-46762) has been discovered in Apache Parquet Java, exposing systems using the parquet-avro module to remote code…

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks
05
May
2025

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site scripting (XSS) and server-side request forgery (SSRF) attacks. These…

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims
05
May
2025

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed a surge in malicious activity tied…

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis
05
May
2025

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft’s WinDbg, dramatically simplifying Windows crash dump analysis. For…

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control
05
May
2025

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the “SonicBoom Attack Chain,” which allows hackers to bypass authentication…

NCSC Warns of Ransomware Attacks Targeting UK organisations
05
May
2025

NCSC Warns of Ransomware Attacks Targeting UK organisations

National Cyber Security Centre (NCSC) has issued technical guidance following a series of cyber attacks targeting UK retailers. These incidents…

Claude AI Abused in Influence-as-a-Service Operations and Campaigns
04
May
2025

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range of adversarial operations, most notably a…

Threat Actors Attacking U.S. citizens Via social engineering Attack
04
May
2025

Threat Actors Attacking U.S. citizens Via social engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting U.S. citizens, according to a detailed…

Browser Credential & Sensitive‑Data Heists on the Rise
04
May
2025

Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the notorious financially motivated threat actor Golden…

State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape
04
May
2025

State-Sponsored Hacktivism on the Rise, Transforming the Cyber Threat Landscape

Global cybersecurity landscape is undergoing a significant transformation, as state-sponsored hacktivism gains traction amid ongoing conflicts. In 2024, Forescout Technologies…

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives
04
May
2025

Hundreds of Fortune 500 Companies Have Unknowingly Employed North Korean IT Operatives

North Korean nationals have successfully infiltrated the employee ranks of major global corporations at a scale previously underestimated, creating a…

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss
04
May
2025

Hackers Weaponize Go Modules to Deliver Disk‑Wiping Malware, Causing Massive Data Loss

Cybersecurity researchers uncovered a sophisticated supply chain attack targeting the Go programming language ecosystem in April 2025. Hackers have weaponized…