Category: GBHackers

Cloudflare Introduces Cloudforce One to Detect and Analyze IoCs, IPs, and Domains
19
Mar
2025

Cloudflare Introduces Cloudforce One to Detect and Analyze IoCs, IPs, and Domains

Cloudflare, a leading web infrastructure and security company, has launched the Cloudforce One threat events platform, designed to revolutionize how…

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications
19
Mar
2025

Hackers Exploit Cobalt Strike, SQLMap, and Other Tools to Target Web Applications

A recent cybersecurity incident has highlighted the sophisticated methods used by hackers to target web applications, particularly in South Korea….

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers
19
Mar
2025

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

A critical vulnerability has been discovered in AMI’s MegaRAC software, which is used in Baseboard Management Controllers (BMCs) across various…

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox
19
Mar
2025

MirrorFace Hackers Modify AsyncRAT Execution for Stealthy Deployment in Windows Sandbox

In a significant development, the China-aligned advanced persistent threat (APT) group known as MirrorFace has been observed employing sophisticated tactics…

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability
19
Mar
2025

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical supply-chain attack affecting a widely used…

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware
19
Mar
2025

Advanced Cyber Attack Exploits Booking Websites to Deploy LummaStealer Malware

A sophisticated cyberattack has been uncovered, targeting booking websites to spread the LummaStealer malware. This campaign leverages fake CAPTCHA prompts…

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code
19
Mar
2025

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A critical vulnerability affecting Synology’s DiskStation Manager (DSM) has been disclosed, allowing remote attackers to execute arbitrary code on vulnerable…

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released
19
Mar
2025

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture NTLM hashes and potentially exploit them…

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit
19
Mar
2025

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a severe vulnerability in Fortinet’s FortiOS and…

New ClearFake Variant Uses Fake reCAPTCHA to Deploy Malicious PowerShell Code
18
Mar
2025

New ClearFake Variant Uses Fake reCAPTCHA to Deploy Malicious PowerShell Code

A recent variant of the ClearFake malware framework has been identified, leveraging fake reCAPTCHA and Cloudflare Turnstile verifications to deceive…

Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments
18
Mar
2025

Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments

A novel defense strategy, MirrorGuard, has been proposed to enhance the security of large language models (LLMs) against jailbreak attacks….

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices
18
Mar
2025

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices, particularly in the era of the…