Category: GBHackers

Threat Actors Steal 3.2 Billion Login Credentials and Infect 23 Million Devices Worldwide
19
Mar
2025

Threat Actors Steal 3.2 Billion Login Credentials and Infect 23 Million Devices Worldwide

In a stark revelation of the escalating cyber threat landscape, Flashpoint’s latest intelligence report highlights the alarming rise in compromised…

Threat Actors Leverage Legacy Drivers to Circumvent TLS Certificate Validation
19
Mar
2025

Threat Actors Leverage Legacy Drivers to Circumvent TLS Certificate Validation

Threat actors have recently been exploiting legacy drivers to bypass certificate validation, leveraging a technique known as “Legacy Driver Exploitation.”…

Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected
19
Mar
2025

Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected

Threat actors have increasingly been leveraging legitimate remote monitoring and management (RMM) software to infiltrate and navigate through networks undetected….

mySCADA myPRO Manager RCE Vulnerabilities Allow Remote Attackers to Take Control of ICS Devices
19
Mar
2025

mySCADA myPRO Manager RCE Vulnerabilities Allow Remote Attackers to Take Control of ICS Devices

In a significant discovery, PRODAFT’s security research team has identified two critical vulnerabilities in the mySCADA myPRO Manager, a widely…

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection
19
Mar
2025

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to deceive detection systems. This technique, confirmed…

SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats
19
Mar
2025

SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats

The average corporate user now has 146 stolen records linked to their identity, an average 12x increase from previous estimates,…

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control
19
Mar
2025

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

Supervisory Control and Data Acquisition (SCADA) systems play a pivotal role in managing critical infrastructure across sectors like energy, manufacturing,…

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files
19
Mar
2025

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it susceptible to severe security breaches. These…

New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware
19
Mar
2025

New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware

A threat intelligence researcher from Cato CTRL, part of Cato Networks, has successfully exploited a vulnerability in three leading generative…

US Sperm Donor Giant California Cryobank Hit by Data Breach
19
Mar
2025

US Sperm Donor Giant California Cryobank Hit by Data Breach

California Cryobank, a leading sperm donation facility based in Los Angeles, has been impacted by a significant data breach, potentially…

Cloudflare Introduces Cloudforce One to Detect and Analyze IoCs, IPs, and Domains
19
Mar
2025

Cloudflare Introduces Cloudforce One to Detect and Analyze IoCs, IPs, and Domains

Cloudflare, a leading web infrastructure and security company, has launched the Cloudforce One threat events platform, designed to revolutionize how…

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications
19
Mar
2025

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

A recent cybersecurity incident has highlighted the sophisticated methods used by hackers to target web applications, particularly in South Korea….