Category: GBHackers

Security Policy Development Codifying NIST CSF For Enterprise Adoption
30
Apr
2025

Security Policy Development Codifying NIST CSF For Enterprise Adoption

The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) has become a fundamental reference for organizations aiming to…

Mitigating Insider Threats - A CISO's Practical Approach
30
Apr
2025

Mitigating Insider Threats – A CISO’s Practical Approach

Insider threats represent one of the most challenging cybersecurity risks facing organizations today, with incidents on the rise and costs…

The CISO’s Guide to Effective Cloud Security Strategies
30
Apr
2025

The CISO’s Guide to Effective Cloud Security Strategies

As organizations accelerate cloud adoption, CISOs face unprecedented challenges securing dynamic, multi-cloud environments. The shift to cloud-native architectures, hybrid workloads,…

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams
30
Apr
2025

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams

Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat actors in investment scams, which, according…

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens
30
Apr
2025

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace’s Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been exploiting legitimate Software-as-a-Service (SaaS) platforms like…

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks
30
Apr
2025

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing Simulator, designed to empower organizations in…

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations
30
Apr
2025

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising strategies. Recent investigations have uncovered a…

How CISOs Can Strengthen Supply Chain Security in 2025
30
Apr
2025

How CISOs Can Strengthen Supply Chain Security in 2025

The responsibilities of Chief Information Security Officers (CISOs) are rapidly evolving as digital transformation and global interconnectivity reshape the modern…

Cato Networks macOS Client Vulnerability Enables Low-Privilege Code Execution
30
Apr
2025

Cato Networks macOS Client Vulnerability Enables Low-Privilege Code Execution

A critical vulnerability in Cato Networks’ widely used macOS VPN client has been disclosed, enabling attackers with limited access to…

Researchers Uncovered RansomHub operation and it's Relation With Qilin ransomware
30
Apr
2025

Researchers Uncovered RansomHub operation and it’s Relation With Qilin ransomware

Security researchers have identified significant connections between two major ransomware-as-a-service (RaaS) operations, with evidence suggesting affiliates from the recently-disabled RansomHub…

New WordPress Malware Disguised as Anti-Malware Plugin Takes Full Control of Websites
30
Apr
2025

New WordPress Malware Disguised as Anti-Malware Plugin Takes Full Control of Websites

The Wordfence Threat Intelligence team has identified a new strain of WordPress malware that masquerades as a legitimate plugin, often…

Firefox 138 Launches with Patches for Several High-Severity Flaws
30
Apr
2025

Firefox 138 Launches with Patches for Several High-Severity Flaws

Mozilla has officially released Firefox 138, marking a significant update focused on user security. The new version addresses multiple high-severity…