Category: GBHackers

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands
28
Mar
2025

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed “Morphing Meerkat,” that leverages DNS mail exchange (MX) records to…

GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries
28
Mar
2025

GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries

A critical SQL injection vulnerability, tracked as CVE-2025-24799, has been identified in GLPI, a widely used open-source IT Service Management (ITSM) tool….

A Framework for Detecting Backdoor Attacks in Deep Learning Models
28
Mar
2025

A Framework for Detecting Backdoor Attacks in Deep Learning Models

Deep learning models, increasingly integral to safety-critical systems like self-driving cars and medical devices, are vulnerable to stealthy backdoor attacks….

SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server
28
Mar
2025

SHELBY Malware Steals Data by Abusing GitHub as Command-and-Control Server

Elastic Security Labs has uncovered a sophisticated malware campaign, dubbed REF8685, targeting the Iraqi telecommunications sector. The campaign utilizes a…

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data
28
Mar
2025

Russian Hackers Impersonate CIA to Steal Ukrainian Defense Intelligence Data

In a complex cyber operation discovered by Silent Push Threat Analysts, Russian hackers have launched a multi-pronged phishing campaign impersonating…

46 New Vulnerabilities in Solar Inverter Systems Allow Attackers to Tamper with Settings
28
Mar
2025

46 New Vulnerabilities in Solar Inverter Systems Allow Attackers to Tamper with Settings

Forescout Vedere Labs has uncovered 46 new vulnerabilities in solar power systems, primarily affecting inverters from three leading manufacturers Sungrow,…

Malicious Snow White Movie Download Targets Viewers with New Malware
28
Mar
2025

Malicious Snow White Movie Download Targets Viewers with New Malware

As the latest adaptation of Snow White hits theaters with lukewarm reception, the absence of streaming options on platforms like…

Red Team Tactics Grow More Sophisticated with Advancements in Artificial Intelligence
28
Mar
2025

Red Team Tactics Grow More Sophisticated with Advancements in Artificial Intelligence

A recent scoping review has revealed that red team tactics are becoming increasingly sophisticated as artificial intelligence (AI) technologies advance….

Hackers Exploit MailChimp Email Marketing Platform Using Phishing and Social Engineering Tactics
28
Mar
2025

Hackers Exploit MailChimp Email Marketing Platform Using Phishing and Social Engineering Tactics

Cybercriminals are increasingly targeting MailChimp, a popular email marketing platform, through sophisticated phishing and social engineering attacks. Recent incidents reveal…

Meta AI Expands to 41 European Countries in New Rollout
28
Mar
2025

Meta AI Expands to 41 European Countries in New Rollout

Meta AI has announced its rollout across 41 European countries. This development marks a critical step in the company’s mission…

Cloudflare Introduces OpenPubkey SSH with Single Sign-On Integration
28
Mar
2025

Cloudflare Introduces OpenPubkey SSH with Single Sign-On Integration

Cloudflare has contributed to the open-sourcing of OPKSSH, a tool that integrates single sign-on (SSO) technologies like OpenID Connect (OIDC)…

Tor Browser 14.0.8 Emergency Release for Windows Users
28
Mar
2025

Tor Browser 14.0.8 Emergency Release for Windows Users

The Tor Project has swiftly released an emergency update for the Tor Browser, 14.0.8, which is exclusively available for Windows…