Category: GBHackers

New Report of of 1M+ malware samples Show Application Layer Abused for stealthy C2
10
Feb
2025

New Report of of 1M+ malware samples Show Application Layer Abused for stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed a growing trend in the exploitation…

SHA256 Hash Calculation from Data Chunks
10
Feb
2025

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity and authenticity. It processes input data…

Massive Brute Force Attack Targets VPN & Firewall Logins Using 2.8 Million IPs
10
Feb
2025

Massive Brute Force Attack Targets VPN & Firewall Logins Using 2.8 Million IPs

Massive brute force attacks targeting VPNs and firewalls have surged in recent weeks, with cybercriminals using as many as 2.8…

Cisco Data Breach - New Ransomware Group Compromised Cisco Internal Network
10
Feb
2025

Cisco Data Breach – New Ransomware Group Compromised Cisco Internal Network

Sensitive credentials from Cisco’s internal network and domain infrastructure were reportedly made public due to a significant data breach. According…

Linux Kernel 6.14-rc2 Released - What's Newly Added !
10
Feb
2025

Linux Kernel 6.14-rc2 Released – What’s Newly Added !

Linus Torvalds, lead developer of the Linux kernel, announced the second release candidate (rc2) of Linux Kernel 6.14, providing developers…

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data
10
Feb
2025

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data

Serious vulnerabilities in Zimbra Collaboration Suite (ZCS), a popular enterprise email and collaboration platform, have raised alarm in the cybersecurity…

Tor Browser 14.0.6 Released, What’s New!
10
Feb
2025

Tor Browser 14.0.6 Released, What’s New!

Free Webinar – Supply Chain Attack Prevention Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers….

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released
10
Feb
2025

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious cybersecurity concerns. Identified as CVE-2024-12754 and…

UK Forces Apple Create Global Backdoor to Spy on Encrypted iCloud Data
08
Feb
2025

UK Forces Apple Create Global Backdoor to Spy on Encrypted iCloud Data

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all encrypted content stored in its iCloud…

A Novel Defense Against Backdoor Attacks
07
Feb
2025

A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is transmitted by focusing on the meaning…

Real-World AD Breaches and the Future of Cybersecurity
07
Feb
2025

Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning and automation capabilities to simulate sophisticated…

Cybercriminals Target IIS Servers to Spread BadIIS Malware
07
Feb
2025

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services (IIS) servers by threat actors deploying…