Category: GBHackers

Proton Warns of 300 Million Stolen Login Details Circulating on Dark Web
03
Nov
2025

Proton Warns of 300 Million Stolen Login Details Circulating on Dark Web

Privacy-focused technology company Proton has issued a warning about the escalating data breach crisis, revealing that hundreds of millions of…

EDR-Redir V2 Evades Detection on Windows 11 by Faking Program Files
03
Nov
2025

EDR-Redir V2 Evades Detection on Windows 11 by Faking Program Files

Security researcher TwoSevenOneT has released EDR-Redir V2, an upgraded evasion tool that exploits Windows bind link technology to bypass endpoint…

OpenAI Introduces Aardvark, an AI Security Agent Powered by GPT-5
03
Nov
2025

OpenAI Introduces Aardvark, an AI Security Agent Powered by GPT-5

OpenAI has announced the launch of Aardvark, an autonomous AI security agent powered by GPT-5 that aims to revolutionize how…

What Rural Internet Providers Offer Remote Communities - GBHackers Security
02
Nov
2025

What Rural Internet Providers Offer Remote Communities – GBHackers Security

Loss of internet access in rural areas is considerably more serious, as it disrupts education, work, and communication. Despite such…

New Email Security Technique Prevents Phishing Attacks Behind NPM Breach
01
Nov
2025

New Email Security Technique Prevents Phishing Attacks Behind NPM Breach

The discovery of a large-scale NPM ecosystem compromise in September 2025 has renewed focus on email security as the critical…

Akira Ransomware Strikes Apache OpenOffice, Allegedly Exfiltrates 23GB of Data
01
Nov
2025

Akira Ransomware Strikes Apache OpenOffice, Allegedly Exfiltrates 23GB of Data

The notorious Akira ransomware gang announced on October 29, 2025, that it successfully penetrated the systems of Apache OpenOffice, claiming…

Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents
01
Nov
2025

Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents

In October 2025, cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated malware campaign distributing weaponized ZIP…

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks
01
Nov
2025

CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks

The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities catalog,…

Cisco IOS XE Vulnerability Being Abused in the Wild to Plant BADCANDY
01
Nov
2025

Cisco IOS XE Vulnerability Being Abused in the Wild to Plant BADCANDY

Cybersecurity authorities are raising urgent alarms as threat actors continue to exploit a critical vulnerability in Cisco IOS XE devices,…

CISA Issues Advisory on XWiki Flaw Allowing Remote Code Execution
31
Oct
2025

CISA Issues Advisory on XWiki Flaw Allowing Remote Code Execution

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting XWiki Platform to its Known Exploited Vulnerabilities…

Google Launches New AI Security Features on Android to Block Mobile Scams
31
Oct
2025

Google Launches New AI Security Features on Android to Block Mobile Scams

Google has announced enhanced artificial intelligence protections designed to combat the rising tide of mobile scams affecting billions of users…

Attackers Exploit Windows Server Update Services Flaw to Steal Sensitive Organizational Data
31
Oct
2025

Attackers Exploit Windows Server Update Services Flaw to Steal Sensitive Organizational Data

Sophos researchers have identified real-world exploitation of a newly disclosed vulnerability in Windows Server Update Services (WSUS), where threat actors…