Category: GBHackers

MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure
16
Apr
2025

MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure

A leaked internal memo dated April 15, 2025, has sent shockwaves through the cybersecurity community, revealing that MITRE’s contract to…

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility
16
Apr
2025

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility

Zeek, formerly known as Bro, has established itself as a leading open-source network security monitoring platform. As organizations face increasingly…

DOGE 'Big Balls' Ransomware Utilizes ZIP-Based LNK Shortcuts and BYOVD Techniques for Stealthy Attacks
15
Apr
2025

DOGE ‘Big Balls’ Ransomware Utilizes ZIP-Based LNK Shortcuts and BYOVD Techniques for Stealthy Attacks

A new and highly sophisticated ransomware campaign, dubbed “DOGE BIG BALLS Ransomware,” has recently come to light, demonstrating a blend…

Cybercriminals Exploit EC2 Instance Metadata Vulnerability to Launch Attacks on Hosted Websites
15
Apr
2025

Cybercriminals Exploit EC2 Instance Metadata Vulnerability to Launch Attacks on Hosted Websites

Cybercriminals have launched a sophisticated campaign targeting websites hosted on Amazon Web Services (AWS) EC2 instances. This campaign, observed in…

ChatGPT Image Generator Abused for Fake Passport Production
15
Apr
2025

ChatGPT Image Generator Abused for Fake Passport Production

OpenAI’s ChatGPT image generator has been exploited to create convincing fake passports in mere minutes, highlighting a significant vulnerability in…

Unmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript Loader
15
Apr
2025

Unmasking Xworm Payload Execution Path through Jailbreaking a Malicious JScript Loader

Security researchers are analyzing a sophisticated malware delivery mechanism that uses a JScript loader to deploy different payloads based on…

PasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps
15
Apr
2025

PasivRobber Malware Emerges, Targeting macOS to Steal Data From Systems and Apps

A sophisticated new malware suite targeting macOS, dubbed “PasivRobber,” has been discovered by security researchers. Identified on March 13, 2025,…

From ISO to NIS2 - Mapping Compliance Requirements Globally
15
Apr
2025

From ISO to NIS2 – Mapping Compliance Requirements Globally

The global regulatory landscape for cybersecurity is undergoing a seismic shift, with the European Union’s NIS2 Directive emerging as a…

New 'Waiting Thread Hijacking' Malware Technique Evades Modern Security Measures
15
Apr
2025

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed “Waiting Thread Hijacking” (WTH), designed to execute malicious code…

Security Awareness Metrics That Matter to the CISO
15
Apr
2025

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies adopt zero-trust architectures. Chief Information Security…

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage
15
Apr
2025

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due to an unexpected outage, impacting workplace…

Cloud Misconfigurations - A Leading Cause of Data Breaches
15
Apr
2025

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost savings. However, this rapid shift to…