Category: GBHackers

New PyPI Malware Targets Developers to Steal Ethereum Wallets
07
Mar
2025

New PyPI Malware Targets Developers to Steal Ethereum Wallets

A recent discovery by the Socket Research Team has unveiled a malicious PyPI package named set-utils, designed to steal Ethereum…

Strela Stealer Malware Targets Microsoft Outlook Users for Credential Theft
07
Mar
2025

Strela Stealer Malware Targets Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer malware, a sophisticated infostealer designed to…

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms
07
Mar
2025

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical letters claiming to be from the…

Akira Ransomware Targets Windows Servers via RDP and Evades EDR with Webcam Trick
07
Mar
2025

Akira Ransomware Targets Windows Servers via RDP and Evades EDR with Webcam Trick

In a recent cybersecurity incident, the Akira ransomware group demonstrated its evolving tactics by exploiting an unsecured webcam to bypass…

Fake Tax Claims Scam Stealing Over $10,000 from Victims
07
Mar
2025

Fake Tax Claims Scam Stealing Over $10,000 from Victims

Tax season has become a breeding ground for sophisticated AI-powered scams, with nearly half of Americans reporting fraudulent IRS-related communications,…

Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks
07
Mar
2025

Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks

A recent security analysis of Draytek Vigor routers has uncovered severe vulnerabilities that could allow attackers to hijack devices, execute…

Multiple Jenkins Vulnerabilities Allow Attackers to Expose Secrets
07
Mar
2025

Multiple Jenkins Vulnerabilities Allow Attackers to Expose Secrets

Jenkins, the widely-used open-source automation server, issued a high-priority security advisory on March 5, 2025, disclosing four medium-severity vulnerabilities affecting…

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware
07
Mar
2025

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware

A sophisticated malware operation, dubbed “Phantom Goblin,” has been identified by cybersecurity researchers, highlighting the increasing use of social engineering…

Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data
07
Mar
2025

Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data

In a recent study published by Palo Alto Networks’ Threat Research Center, researchers successfully jailbroke 17 popular generative AI (GenAI)…

Microsoft Introduces 365 E5 Security Add-On for Business Premium Customers
07
Mar
2025

Microsoft Introduces 365 E5 Security Add-On for Business Premium Customers

Microsoft has launched Microsoft 365 E5 Security as an add-on to its Business Premium suite, providing small and medium-sized businesses…

GitHub Explains How Security Professionals Can Use Copilot for Log Analysis
07
Mar
2025

GitHub Explains How Security Professionals Can Use Copilot for Log Analysis

GitHub Copilot, once a developer-centric tool, is now revolutionizing workflows across technical and non-technical roles. With features like Agent Mode,…

Medusa Ransomware Attacks Surge 42% with Advanced Tools & Tactics
07
Mar
2025

Medusa Ransomware Attacks Surge 42% with Advanced Tools & Tactics

Medusa ransomware attacks have seen a significant increase, rising by 42% between 2023 and 2024, with a further escalation in…