Category: GBHackers

New Whisper-Based Attack Reveals User Prompts Hidden Inside Encrypted AI Traffic
10
Nov
2025

New Whisper-Based Attack Reveals User Prompts Hidden Inside Encrypted AI Traffic

Microsoft researchers have unveiled a sophisticated side-channel attack targeting remote language models that could allow adversaries to infer conversation topics…

Monsta FTP Remote Code Execution Flaw Being Exploited in the Wild
10
Nov
2025

Monsta FTP Remote Code Execution Flaw Being Exploited in the Wild

Security researchers have discovered an actively exploited remote code execution vulnerability in Monsta FTP, a web-based FTP client used by…

AI-Powered Cyber Threats Rise: Attackers Target Manufacturing Sector
08
Nov
2025

AI-Powered Cyber Threats Rise: Attackers Target Manufacturing Sector

A comprehensive new report reveals that manufacturing organizations are grappling with a dual challenge: rapidly adopting generative AI technologies while…

New “LANDFALL” Android Malware Uses Samsung 0-Day Vulnerability Hidden in WhatsApp Images
08
Nov
2025

New “LANDFALL” Android Malware Uses Samsung 0-Day Vulnerability Hidden in WhatsApp Images

Cybersecurity researchers at Unit 42 have uncovered a sophisticated Android spyware campaign that exploited a previously unknown zero-day vulnerability in…

New Microsoft Teams Feature Exposes Users to Phishing and Malware Risks
08
Nov
2025

New Microsoft Teams Feature Exposes Users to Phishing and Malware Risks

Microsoft is poised to roll out a significant update to Teams, enabling users to initiate chats with anyone using just…

Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domain
07
Nov
2025

Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domain

Security researchers have uncovered a dangerous attack vector targeting Active Directory Sites, a critical yet often overlooked component of enterprise…

New Analysis Reveals LockBit 5.0’s Core Features and Dual-Stage Attack Model
07
Nov
2025

New Analysis Reveals LockBit 5.0’s Core Features and Dual-Stage Attack Model

LockBit has remained one of the most dominant ransomware-as-a-service (RaaS) groups in the world since its emergence as ABCD ransomware…

Weaponized Videos Trigger Self-Infection Tactics
07
Nov
2025

Weaponized Videos Trigger Self-Infection Tactics

ClickFix attacks have surged dramatically over the past year, cementing their position as pivotal tools in the modern attacker’s arsenal….

Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware
07
Nov
2025

Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware

A new ransomware group, Cephalus, has emerged in the cybersecurity threat landscape, targeting organizations through compromised Remote Desktop Protocol (RDP)…

German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure
07
Nov
2025

German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure

German hosting provider aurologic GmbH has emerged as a critical hub within the global malicious infrastructure ecosystem, according to recent…

Herodotus Android Banking Trojan Takes Over Devices, Outsmarts Security Tools
07
Nov
2025

Herodotus Android Banking Trojan Takes Over Devices, Outsmarts Security Tools

A new threat has surfaced in the mobile banking landscape Herodotus, a sophisticated Android banking Trojan that has been wreaking…

U.S. Congressional Budget Office Hit by Cyberattack, Sensitive Data Compromised
07
Nov
2025

U.S. Congressional Budget Office Hit by Cyberattack, Sensitive Data Compromised

The Congressional Budget Office (CBO), which serves as Congress’s official financial advisor, has been targeted in a suspected cyberattack by…