Category: GBHackers
Conversational AI platforms, powered by chatbots, are witnessing a surge in malicious attacks, which leverage NLP and ML are increasingly…
The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of…
Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing…
Hackers are increasingly exploiting third-party email infrastructures to send spam emails. This tactic complicates the detection and prevention of spam…
Cybersecurity researchers have uncovered a significant vulnerability in Kia vehicles that allowed hackers to remotely control key functions using nothing…
The RomCom malware family, particularly its SnipBot variant, has evolved into a sophisticated threat capable of ransomware, extortion, and targeted…
Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages. While base system-generated environments can’t be…
The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data,…
North Korean IT workers, disguised as non-North Koreans, infiltrate various industries to generate revenue for their regime, evading sanctions and…
Researchers observed two distinct instances where users were inadvertently led to malicious websites after conducting Google searches for video streaming…
The original threat actor behind the Octo malware family has released a new variant, Octo2, with enhanced stability for remote…
The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear-phishing to exploit the Zerologon vulnerability, allowing them to gain…











