Category: GBHackers

Cloudflare Reveals AI Labyrinth to Counter Automated AI Attacks
24
Mar
2025

Cloudflare Reveals AI Labyrinth to Counter Automated AI Attacks

Cloudflare has unveiled AI Labyrinth, an innovative platform designed to combat AI-powered bots that relentlessly crawl and scrape data from websites…

WordPress Plugin Flaw Puts 200,000+ Sites at Risk of Code Execution
24
Mar
2025

WordPress Plugin Flaw Puts 200,000+ Sites at Risk of Code Execution

A critical security vulnerability has been discovered in the popular WordPress plugin, WP Ghost, which boasts over 200,000 active installations….

Critical Next.js Middleware Vulnerability Allows Attackers to Bypass Authorization
24
Mar
2025

Critical Next.js Middleware Vulnerability Allows Attackers to Bypass Authorization

A severe vulnerability has been identified in Next.js, a popular React framework used for building web applications, under the designation…

China’s Baidu Compromised in Data Leak, Affecting Users
24
Mar
2025

China’s Baidu Compromised in Data Leak, Affecting Users

Chinese tech giant Baidu has faced severe scrutiny after allegations emerged that a top executive’s teenage daughter had accessed and…

New Browser-Based RDP Tool Enables Secure Remote Access to Windows Servers
24
Mar
2025

New Browser-Based RDP Tool Enables Secure Remote Access to Windows Servers

Cloudflare has introduced a groundbreaking browser-based Remote Desktop Protocol (RDP) solution. This innovative tool allows users to securely access Windows…

Threat Actors Leverage Reddit to Spread AMOS and Lumma Stealers
21
Mar
2025

Threat Actors Leverage Reddit to Spread AMOS and Lumma Stealers

In a recent surge of cyber threats, threat actors have been exploiting Reddit to distribute two potent malware variants: AMOS…

Hackers Use Fake Meta Emails to Steal Ad Account Credentials
21
Mar
2025

Hackers Use Fake Meta Emails to Steal Ad Account Credentials

A recent phishing campaign uncovered by the Cofense Phishing Defense Center (PDC) has been exploiting fake Meta emails to deceive…

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control
21
Mar
2025

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has been found to have critical security…

Researchers Reveal macOS Vulnerability Exposing System Passwords
21
Mar
2025

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified as CVE-2024-54471, which was patched in…

Researchers Uncover FIN7's Stealthy Python-Based Anubis Backdoor
21
Mar
2025

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed by the notorious cybercrime group FIN7….

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware
21
Mar
2025

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA challenges to trick users into executing…

Albabat Ransomware Targets Windows, Linux, and macOS via GitHub Abuse
21
Mar
2025

Albabat Ransomware Targets Windows, Linux, and macOS via GitHub Abuse

Recent research by Trend Micro has uncovered a significant evolution in the Albabat ransomware, which now targets not only Windows…