Category: GBHackers

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads
23
Apr
2025

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities, are utilizing a malicious traffic…

FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code
23
Apr
2025

FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code

A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been disclosed, enabling attackers to execute unauthorized…

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials
23
Apr
2025

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials

Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building tool, to orchestrate sophisticated phishing and…

Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE - GBHackers Security
23
Apr
2025

Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE – GBHackers Security

Lattica, an FHE-based platform enabling secure and private use of AI in the cloud, has emerged from stealth with $3.25…

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers
23
Apr
2025

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that could allow attackers to silently drain…

New Malware Hijacks Docker Images Using Unique Obfuscation Technique
23
Apr
2025

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services according to Darktrace’s honeypot data, has…

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials
23
Apr
2025

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users with malicious Word documents designed to…

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access
23
Apr
2025

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Researchers have exposed a sophisticated cyberattack technique dubbed the “Cookie-Bite Attack,” which allows adversaries to bypass Multi-Factor Authentication (MFA) and…

Synology Network File System Vulnerability Allows Unauthorized File Access
23
Apr
2025

Synology Network File System Vulnerability Allows Unauthorized File Access

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021, has been resolved after allowing unauthorized…

Super-Smart AI Could Launch Attacks Sooner Than We Think
23
Apr
2025

Super-Smart AI Could Launch Attacks Sooner Than We Think

In a development for cybersecurity, large language models (LLMs) are being weaponized by malicious actors to orchestrate sophisticated attacks at…

CrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection
23
Apr
2025

CrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection

CrowdStrike today announced the general availability of Falcon® Privileged Access, a breakthrough module in its Falcon® Identity Protection suite, aimed…

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders
23
Apr
2025

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders

Leading British retailer Marks & Spencer Group plc (M&S) has confirmed it has been grappling with a cyberattack over the…