Category: GBHackers

CISA Issues Two New ICS Advisories Addressing Exploits and Vulnerabilities
19
Feb
2025

CISA Issues Two New ICS Advisories Addressing Exploits and Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) escalated its cybersecurity alerts on February 18, 2025, releasing two critical Industrial…

Chrome Buffer Overflow Flaws Let Hackers Execute Arbitrary Code & Gain System Access
19
Feb
2025

Chrome Buffer Overflow Flaws Let Hackers Execute Arbitrary Code & Gain System Access

Google has rolled out an urgent security update for its Chrome browser, patching three vulnerabilities—including two critical heap buffer overflow…

EagerBee Malware Targets Government Agencies & ISPs with Stealthy Backdoor Attack
18
Feb
2025

EagerBee Malware Targets Government Agencies & ISPs with Stealthy Backdoor Attack

A sophisticated cyber espionage campaign leveraging the EagerBee malware has been targeting government agencies and Internet Service Providers (ISPs) across…

A Novel Backdoor Attack Exploiting Customized LLMs' Reasoning Capabilities
18
Feb
2025

A Novel Backdoor Attack Exploiting Customized LLMs’ Reasoning Capabilities

The rise of customized large language models (LLMs) has revolutionized artificial intelligence applications, enabling businesses and individuals to leverage advanced…

Cybercriminals Embedded Credit Card Stealer Script Within Tag
18
Feb
2025

Cybercriminals Embedded Credit Card Stealer Script Within Tag

Cybersecurity researchers have uncovered a new MageCart malware campaign targeting e-commerce websites running on the Magento platform. This attack exploits…

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation
18
Feb
2025

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation

A significant vulnerability has been identified in large language models (LLMs) such as ChatGPT, raising concerns over their susceptibility to…

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats
18
Feb
2025

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats

A recent study by researchers from the National University of Singapore and NCS Cyber Special Ops R&D explores how the…

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems
18
Feb
2025

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of popular games. Exploiting the holiday season’s…

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension
18
Feb
2025

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using the .NET framework. This malware is…

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions
18
Feb
2025

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions

A sophisticated malware campaign leveraging the Lumma InfoStealer has been identified, targeting educational institutions to distribute malicious files disguised as…

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions
18
Feb
2025

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions

Intel by Intruder now uses AI to contextualize NVD descriptions, helping security teams assess risk faster. Intruder, a leader in…

Earth Preta APT Exploit Microsoft Utility Tool to Control Windows
18
Feb
2025

Earth Preta APT Exploit Microsoft Utility Tool to Control Windows

Researchers from Trend Micro’s Threat Hunting team have uncovered a sophisticated cyberattack campaign by the advanced persistent threat (APT) group…