Category: GBHackers

Weaponized Amazon Gift Cards Used to Steal Microsoft Credentials
17
Apr
2025

Weaponized Amazon Gift Cards Used to Steal Microsoft Credentials

Cybercriminals are exploiting the trust in e-gift cards and the prestige of Amazon to steal Microsoft credentials from unsuspecting employees….

China Plans Expanded Cybersecurity Cooperation with Russia
17
Apr
2025

China Plans Expanded Cybersecurity Cooperation with Russia

China has announced a significant step forward in its partnership with Russia, with plans to expand their cooperation in the…

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems
17
Apr
2025

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard for integrating generative AI (GenAI) tools…

Ghost Ransomware Targets Organizations Across 70+ Countries
17
Apr
2025

Ghost Ransomware Targets Organizations Across 70+ Countries

A new ransomware variant known as “Ghost” (also referred to as Cring) has emerged as a significant danger. Since its…

Stolen Data Now Publicly Disclosed
17
Apr
2025

Stolen Data Now Publicly Disclosed

French fintech leader Harvest SAS has become the latest high-profile victim of a sophisticated ransomware attack, culminating this week in the public…

Intel Sells 51% Stake in Altera to Silver Lake in $8.75 Billion Deal
17
Apr
2025

Intel Sells 51% Stake in Altera to Silver Lake in $8.75 Billion Deal

Intel Corporation has announced the divestiture of a 51% stake in its Altera division to Silver Lake, valuing the programmable…

Chinese Hackers Group Mustang Panda Bypass EDR Detection With New Hacking Tools
17
Apr
2025

Chinese Hackers Group Mustang Panda Bypass EDR Detection With New Hacking Tools

The China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ new techniques and tools, including the…

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts
17
Apr
2025

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging the notorious Agent Tesla malware through…

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack
17
Apr
2025

CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports of possible unauthorized access to a…

NetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate Networks
17
Apr
2025

NetFlow and PCAP Logs Reveal Multi-Stage Attacks In Corporate Networks

In the modern enterprise, network security teams face the daunting challenge of detecting and responding to multi-stage attacks that unfold…

CISA Issues Alert on SonicWall Flaw Being Actively Exploited
17
Apr
2025

CISA Issues Alert on SonicWall Flaw Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert after confirming active exploitation of a SonicWall…

Hacker Leaks 33,000 Employee Records in Third-Party API Breach
17
Apr
2025

Hacker Leaks 33,000 Employee Records in Third-Party API Breach

A hacker has exposed the personal records of over 33,000 employees after discovering unrestricted endpoints belonging to a major technology…