Category: GBHackers

Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data
18
Mar
2025

Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data

In a sophisticated phishing campaign uncovered by the BI.ZONE Threat Intelligence team, the Squid Werewolf group, also known as APT37,…

Hackers Use DLL Side-Loading to Deploy Malicious Python Code
18
Mar
2025

Hackers Use DLL Side-Loading to Deploy Malicious Python Code

A recent discovery by Xavier Mertens, a senior handler at the Internet Storm Center, has highlighted a sophisticated attack where…

Details of Sophisticated Multi-Stage Attack Uncovered
18
Mar
2025

Details of Sophisticated Multi-Stage Attack Uncovered

The Bybit hack, which occurred on February 21, 2025, has been extensively analyzed by multiple cybersecurity teams, including Sygnia. This…

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT
18
Mar
2025

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware,…

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds
18
Mar
2025

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds

A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which allows hackers…

Amazon Ends Local Voice Processing, Transitions Fully to Cloud
18
Mar
2025

Amazon Ends Local Voice Processing, Transitions Fully to Cloud

Amazon announced that it will discontinue the local voice processing feature for its AI assistant Alexa. This change, set to…

Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure
18
Mar
2025

Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure

A critical cybersecurity alert has been issued following the active exploitation of a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s…

Quantum-safe clientless Access
18
Mar
2025

Cloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum Attacks

Cloudflare has announced the implementation of post-quantum cryptography across its services. This advancement is part of a broader effort to…

New Burp Suite Extension for Secret Scanning Released
18
Mar
2025

New Burp Suite Extension for Secret Scanning Released

A new extension for Burp Suite has been released, integrating the powerful secret scanning capabilities of TruffleHog. This innovative integration…

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers
18
Mar
2025

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator tool. This decision comes on the…

Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams
18
Mar
2025

Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams

Cobalt Strike, a highly advanced threat emulation tool, has released version 4.11, packing a robust suite of features designed to…

PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability
18
Mar
2025

PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability

A proof-of-concept (PoC) exploit has been released for a use-after-free vulnerability in the Linux kernel, identified as CVE-2024-36904. This vulnerability…