Category: GBHackers

Infostealer Attacks Surge 84% Weekly Through Phishing Emails
21
Apr
2025

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest…

New Phishing Technique Hides Weaponized HTML Files Within SVG Images
21
Apr
2025

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector Graphics) files for phishing attacks. These…

Cyber Hygiene Best Practices for Modern Enterprises
21
Apr
2025

Cyber Hygiene Best Practices for Modern Enterprises

Cyber hygiene refers to the routine practices and fundamental security measures organizations implement to maintain system health and improve security…

Cloud Security Challenges Every CISO Must Address in Hybrid Environments
21
Apr
2025

Cloud Security Challenges Every CISO Must Address in Hybrid Environments

Hybrid cloud environments, which blend on-premises infrastructure with public and private cloud services, have become the backbone of modern enterprises….

Security Awareness Metrics That Matter to the CISO
21
Apr
2025

Security Awareness Metrics That Matter to the CISO

In today’s rapidly evolving threat landscape, Chief Information Security Officers (CISOs) are tasked with more than just deploying the latest…

21
Apr
2025

Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations

Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates…

RedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack Tools
21
Apr
2025

RedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack Tools

Security researchers have linked the notorious RedGolf hacking group to a wave of exploits targeting Fortinet firewall zero-days and the…

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code
21
Apr
2025

Critical PyTorch Vulnerability Allows Hackers to Run Remote Code

A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning framework, allows attackers to execute arbitrary…

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store
21
Apr
2025

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store

A newly documented technique reveals how attackers can exploit the WinDbg Preview debugger to bypass even the strictest Windows Defender…

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR
21
Apr
2025

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

A notorious threat actor has allegedly begun selling “Baldwin Killer,” a sophisticated malware toolkit designed to bypass leading antivirus (AV)…

Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations
21
Apr
2025

Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

The Chinese hacker group known as Billbug, or Lotus Blossom, targeted high-profile organizations across Southeast Asia. The attackers, who were…

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools
21
Apr
2025

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers to bypass traditional Antivirus (AV) and Endpoint Detection and Response…