Category: GBHackers

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks
17
Mar
2025

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction among cybercriminals and nation-state-sponsored groups….

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials
17
Mar
2025

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials

The HELLCAT ransomware group has claimed responsibility for a significant data breach at Jaguar Land Rover (JLR), exposing vast amounts…

Apple Introduces RCS End-to-End Encryption for iPhone Messages
17
Mar
2025

Apple Introduces RCS End-to-End Encryption for iPhone Messages

Apple has announced the integration of end-to-end encryption (E2EE) for Rich Communication Services (RCS) on iPhones. This development follows the…

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers
17
Mar
2025

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers

A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache Tomcat, identified as CVE-2025-24813. This vulnerability…

Hackers Use CSS Tricks to Bypass Spam Filters and Monitor Users
17
Mar
2025

Hackers Use CSS Tricks to Bypass Spam Filters and Monitor Users

Cybersecurity experts have uncovered how hackers use Cascading Style Sheets (CSS) to deceive spam filters and monitor user behavior. This…

Adobe Acrobat Vulnerabilities Enable Remote Code Execution
17
Mar
2025

Adobe Acrobat Vulnerabilities Enable Remote Code Execution

A recent disclosure by Cisco Talos’ Vulnerability Discovery & Research team highlighted several vulnerability issues in Adobe Acrobat. All of…

Hackers Target TP-Link Vulnerability to Gain Full System Control
17
Mar
2025

Hackers Target TP-Link Vulnerability to Gain Full System Control

Hackers exploit a vulnerability in TP-Link routers, specifically the TL-WR845N model, to gain full control over the system. This exploit…

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers
14
Mar
2025

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting both Windows and Linux systems. The…

AWS SNS Exploited for Data Exfiltration and Phishing Attacks
14
Mar
2025

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services’ Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service that facilitates communication between applications and…

New Context Compliance Exploit Jailbreaks Major AI Models
14
Mar
2025

New Context Compliance Exploit Jailbreaks Major AI Models

Microsoft researchers have uncovered a surprisingly straightforward method that can bypass safety guardrails in most leading AI systems. In a…

DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware
14
Mar
2025

DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware

The increasing popularity of generative artificial intelligence (GenAI) tools, such as OpenAI’s ChatGPT and Google’s Gemini, has attracted cybercriminals seeking…

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks
14
Mar
2025

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR Software that could allow attackers to…