Category: GBHackers

SolarWinds Improves Web Help Desk in Latest 12.8.5 Update
11
Feb
2025

SolarWinds Improves Web Help Desk in Latest 12.8.5 Update

SolarWinds announced the release of Web Help Desk (WHD) version 12.8.5, unveiling a host of new features, updates, and fixes…

Advanced Protection Against AI-Powered CAPTCHA Attacks
11
Feb
2025

Advanced Protection Against AI-Powered CAPTCHA Attacks

As AI technologies continue to evolve, traditional CAPTCHA systems face increasing vulnerabilities. Recent studies reveal that advanced AI models, such…

EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS
11
Feb
2025

EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS

Advanced Persistent Threats (APTs) represent a sophisticated and stealthy category of cyberattacks targeting critical organizations globally. Unlike common malware, APTs…

OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia
11
Feb
2025

OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia

OpenAI, the organization behind ChatGPT and other advanced AI tools, is making significant strides in its efforts to reduce its…

New York Bans DeepSeek Over Potential Data Risks
11
Feb
2025

New York Bans DeepSeek Over Potential Data Risks

 New York Governor Kathy Hochul announced that the state has banned the use of the China-based AI startup DeepSeek on…

Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks
11
Feb
2025

Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks

Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks. According to the whoisxmlapi shared on…

Akira Ransomware Dominates January 2025 as the Most Active Ransomware Threat
11
Feb
2025

Akira Ransomware Dominates January 2025 as the Most Active Ransomware Threat

January 2025 marked a pivotal month in the ransomware landscape, with Akira emerging as the most active and dominant threat…

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures
11
Feb
2025

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures

Recent research has highlighted the increasingly sophisticated tactics, techniques, and procedures (TTPs) employed by North Korean state-sponsored hackers. These cyber…

Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices
11
Feb
2025

Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices

Innovative tools are continually appearing to enhance the capabilities of professionals and enthusiasts alike. One new entrant into the world…

FinStealer Malware Targets Leading Indian Bank's Mobile Users, Stealing Login Credentials
11
Feb
2025

FinStealer Malware Targets Leading Indian Bank’s Mobile Users, Stealing Login Credentials

A new cybersecurity threat has emerged, targeting customers of a prominent Indian bank through fraudulent mobile applications. Dubbed “FinStealer,” this…

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft
11
Feb
2025

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

A newly discovered phishing campaign targeting Facebook users has been identified by researchers at Check Point Software Technologies. The attack,…

DeepSeek Accused of Over-Collecting Personal Data, Says South Korea’s Spy Agency
11
Feb
2025

DeepSeek Accused of Over-Collecting Personal Data, Says South Korea’s Spy Agency

South Korea’s National Intelligence Service (NIS) has raised alarms over the Chinese artificial intelligence app, DeepSeek, accusing it of “excessively”…