Category: GBHackers

Multiple Jenkins Vulnerabilities Allow Attackers to Expose Secrets
07
Mar
2025

Multiple Jenkins Vulnerabilities Allow Attackers to Expose Secrets

Jenkins, the widely-used open-source automation server, issued a high-priority security advisory on March 5, 2025, disclosing four medium-severity vulnerabilities affecting…

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware
07
Mar
2025

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware

A sophisticated malware operation, dubbed “Phantom Goblin,” has been identified by cybersecurity researchers, highlighting the increasing use of social engineering…

Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data
07
Mar
2025

Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data

In a recent study published by Palo Alto Networks’ Threat Research Center, researchers successfully jailbroke 17 popular generative AI (GenAI)…

Microsoft Introduces 365 E5 Security Add-On for Business Premium Customers
07
Mar
2025

Microsoft Introduces 365 E5 Security Add-On for Business Premium Customers

Microsoft has launched Microsoft 365 E5 Security as an add-on to its Business Premium suite, providing small and medium-sized businesses…

GitHub Explains How Security Professionals Can Use Copilot for Log Analysis
07
Mar
2025

GitHub Explains How Security Professionals Can Use Copilot for Log Analysis

GitHub Copilot, once a developer-centric tool, is now revolutionizing workflows across technical and non-technical roles. With features like Agent Mode,…

Medusa Ransomware Attacks Surge 42% with Advanced Tools & Tactics
07
Mar
2025

Medusa Ransomware Attacks Surge 42% with Advanced Tools & Tactics

Medusa ransomware attacks have seen a significant increase, rising by 42% between 2023 and 2024, with a further escalation in…

Apache Pinot Vulnerability Allows Remote Attackers to Bypass Authentication
07
Mar
2025

Apache Pinot Vulnerability Allows Remote Attackers to Bypass Authentication

A critical security flaw (CVE-2024-56325) in Apache Pinot, a real-time distributed OLAP datastore, has been disclosed, allowing unauthenticated attackers to…

PrintSteal Cybercrime Group Mass-Producing Fake Aadhaar & PAN Cards
07
Mar
2025

PrintSteal Cybercrime Group Mass-Producing Fake Aadhaar & PAN Cards

A large-scale cybercrime operation dubbed “PrintSteal” has been exposed, revealing a complex network involved in the mass production and distribution…

Microsoft Warns of Silk Typhoon Hackers Exploiting Cloud Services to Attack IT Supply Chain
07
Mar
2025

Microsoft Warns of Silk Typhoon Hackers Exploiting Cloud Services to Attack IT Supply Chain

Microsoft Threat Intelligence has identified a significant shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common…

Hackers Exploit 'Any/Any' Communication Configurations in Cloud Services to Host Malware
07
Mar
2025

Hackers Exploit ‘Any/Any’ Communication Configurations in Cloud Services to Host Malware

Recent research by Veriti has uncovered a disturbing trend in cybersecurity: malicious actors are increasingly leveraging cloud infrastructure to distribute…

BadBox Malware Infects 50,000+ Android Devices via 24 Apps on Google Play
07
Mar
2025

BadBox Malware Infects 50,000+ Android Devices via 24 Apps on Google Play

HUMAN’s Satori Threat Intelligence and Research team has uncovered a complex cyberattack dubbed “BADBOX 2.0,” an evolution of the previously…

Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns
07
Mar
2025

Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns

Trend Micro’s Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC) attack that targeted multiple business partners….