Category: GBHackers

Apple service ticket portal Vulnerability Leaks Sensitive Information
04
Feb
2025

Apple service ticket portal Vulnerability Leaks Sensitive Information

Apple, one of the most trusted technology brands in the world, recently faced a critical security exposure in its service…

Amazon Introduces Redshift Security Features to Prevent Data Leaks
04
Feb
2025

Amazon Introduces Redshift Security Features to Prevent Data Leaks

Amazon Web Services (AWS) has announced significant updates to its popular data warehousing service, Amazon Redshift, with the introduction of…

AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery
04
Feb
2025

AsyncRAT Abusing Python and TryCloudflare For Stealthy Malware Delivery

In a significant finding, Forcepoint’s X-Labs research team has uncovered a new malware campaign that uses AsyncRAT, a notorious remote…

Researchers Discover Novel Techniques to Protect AI Models from Universal Jailbreaks
04
Feb
2025

Researchers Discover Novel Techniques to Protect AI Models from Universal Jailbreaks

In a significant advancement in AI safety, the Anthropic Safeguards Research Team has introduced a cutting-edge framework called Constitutional Classifiers…

FlexibleFerret Malware Attacking macOS Users, Evading XProtect Detections
04
Feb
2025

FlexibleFerret Malware Attacking macOS Users, Evading XProtect Detections

A new macOS malware variant, dubbed “FlexibleFerret,” has been identified targeting developers and job seekers as part of an ongoing…

Beware of Fake DeepSeek PyPI packages that Delivers Malware
04
Feb
2025

Beware of Fake DeepSeek PyPI packages that Delivers Malware

The Positive Technologies Expert Security Center (PT ESC) recently uncovered a malicious campaign targeting the Python Package Index (PyPI) repository….

Emerging Malicious SMS Platform Powering Phishing Attacks
03
Feb
2025

Emerging Malicious SMS Platform Powering Phishing Attacks

In the ever-evolving landscape of cybercrime, bulk SMS platforms like Devil-Traff have emerged as powerful tools for phishing campaigns, exploiting…

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry
03
Feb
2025

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

The Indonesian hacker group “INDOHAXSEC” has allegedly breached the National Tuberculosis Registry (NTBR) of Malaysia, managed by the Ministry of…

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users
31
Jan
2025

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of the largest hacking forums globally—Cracked.io and…

Critical D-Link Router Flaw Allows Attackers to Take Full Remote Control
31
Jan
2025

Critical D-Link Router Flaw Allows Attackers to Take Full Remote Control

A critical unauthenticated Remote Code Execution (RCE) vulnerability has been identified in D-Link’s DSL-3788 routers, specifically hardware revisions Ax/Bx running…

Microsoft Enhances Windows 11 Security with Admin Protection to Prevent Crowdstrike-Like Incident
31
Jan
2025

Microsoft Enhances Windows 11 Security with Admin Protection to Prevent Crowdstrike-Like Incident

Microsoft has introduced “Administrator Protection” (AP), a sophisticated security feature aimed at elevating Windows operating system security by redefining how…

Doppler Announces Integration with Datadog to Streamline Security and Monitoring
31
Jan
2025

Doppler Announces Integration with Datadog to Streamline Security and Monitoring

Doppler, the leading provider of secrets management solutions, announced a new integration with Datadog, a cloud application monitoring and security…