Category: GBHackers

EagerBee Malware Targets Government Agencies & ISPs with Stealthy Backdoor Attack
18
Feb
2025

EagerBee Malware Targets Government Agencies & ISPs with Stealthy Backdoor Attack

A sophisticated cyber espionage campaign leveraging the EagerBee malware has been targeting government agencies and Internet Service Providers (ISPs) across…

A Novel Backdoor Attack Exploiting Customized LLMs' Reasoning Capabilities
18
Feb
2025

A Novel Backdoor Attack Exploiting Customized LLMs’ Reasoning Capabilities

The rise of customized large language models (LLMs) has revolutionized artificial intelligence applications, enabling businesses and individuals to leverage advanced…

Cybercriminals Embedded Credit Card Stealer Script Within Tag
18
Feb
2025

Cybercriminals Embedded Credit Card Stealer Script Within Tag

Cybersecurity researchers have uncovered a new MageCart malware campaign targeting e-commerce websites running on the Magento platform. This attack exploits…

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation
18
Feb
2025

New LLM Vulnerability Exposes AI Models Like ChatGPT to Exploitation

A significant vulnerability has been identified in large language models (LLMs) such as ChatGPT, raising concerns over their susceptibility to…

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats
18
Feb
2025

New Research Aims to Strengthen MITRE ATT&CK for Evolving Cyber Threats

A recent study by researchers from the National University of Singapore and NCS Cyber Special Ops R&D explores how the…

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems
18
Feb
2025

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of popular games. Exploiting the holiday season’s…

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension
18
Feb
2025

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using the .NET framework. This malware is…

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions
18
Feb
2025

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions

A sophisticated malware campaign leveraging the Lumma InfoStealer has been identified, targeting educational institutions to distribute malicious files disguised as…

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions
18
Feb
2025

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions

Intel by Intruder now uses AI to contextualize NVD descriptions, helping security teams assess risk faster. Intruder, a leader in…

Earth Preta APT Exploit Microsoft Utility Tool to Control Windows
18
Feb
2025

Earth Preta APT Exploit Microsoft Utility Tool to Control Windows

Researchers from Trend Micro’s Threat Hunting team have uncovered a sophisticated cyberattack campaign by the advanced persistent threat (APT) group…

Zacks Investment Data Breach Exposes 12 Million Emails and Phone Numbers
18
Feb
2025

Zacks Investment Data Breach Exposes 12 Million Emails and Phone Numbers

A cybersecurity incident at Zacks Investment Research has exposed sensitive data belonging to 12 million users, marking the second major…

LibreOffice Vulnerabilities Allow Attackers to Write to Files and Extract Data
18
Feb
2025

LibreOffice Vulnerabilities Allow Attackers to Write to Files and Extract Data

Two critical vulnerabilities in LibreOffice (CVE-2024-12425 and CVE-2024-12426) expose millions of users to file system manipulation and sensitive data extraction…