Category: GBHackers

Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company
10
Nov
2025

Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company

Intel is pursuing legal action against a former software engineer who the company claims downloaded thousands of confidential files shortly…

Hackers Abuse runc Tool to Escape Containers and Compromise Hosts
10
Nov
2025

Hackers Abuse runc Tool to Escape Containers and Compromise Hosts

Three critical vulnerabilities in runc, the widely-used container runtime that powers Docker and Kubernetes, have been disclosed, allowing attackers to…

New Whisper-Based Attack Reveals User Prompts Hidden Inside Encrypted AI Traffic
10
Nov
2025

New Whisper-Based Attack Reveals User Prompts Hidden Inside Encrypted AI Traffic

Microsoft researchers have unveiled a sophisticated side-channel attack targeting remote language models that could allow adversaries to infer conversation topics…

Monsta FTP Remote Code Execution Flaw Being Exploited in the Wild
10
Nov
2025

Monsta FTP Remote Code Execution Flaw Being Exploited in the Wild

Security researchers have discovered an actively exploited remote code execution vulnerability in Monsta FTP, a web-based FTP client used by…

AI-Powered Cyber Threats Rise: Attackers Target Manufacturing Sector
08
Nov
2025

AI-Powered Cyber Threats Rise: Attackers Target Manufacturing Sector

A comprehensive new report reveals that manufacturing organizations are grappling with a dual challenge: rapidly adopting generative AI technologies while…

New “LANDFALL” Android Malware Uses Samsung 0-Day Vulnerability Hidden in WhatsApp Images
08
Nov
2025

New “LANDFALL” Android Malware Uses Samsung 0-Day Vulnerability Hidden in WhatsApp Images

Cybersecurity researchers at Unit 42 have uncovered a sophisticated Android spyware campaign that exploited a previously unknown zero-day vulnerability in…

New Microsoft Teams Feature Exposes Users to Phishing and Malware Risks
08
Nov
2025

New Microsoft Teams Feature Exposes Users to Phishing and Malware Risks

Microsoft is poised to roll out a significant update to Teams, enabling users to initiate chats with anyone using just…

Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domain
07
Nov
2025

Attackers Exploit Active Directory Sites to Escalate Privileges and Compromise Domain

Security researchers have uncovered a dangerous attack vector targeting Active Directory Sites, a critical yet often overlooked component of enterprise…

New Analysis Reveals LockBit 5.0’s Core Features and Dual-Stage Attack Model
07
Nov
2025

New Analysis Reveals LockBit 5.0’s Core Features and Dual-Stage Attack Model

LockBit has remained one of the most dominant ransomware-as-a-service (RaaS) groups in the world since its emergence as ABCD ransomware…

Weaponized Videos Trigger Self-Infection Tactics
07
Nov
2025

Weaponized Videos Trigger Self-Infection Tactics

ClickFix attacks have surged dramatically over the past year, cementing their position as pivotal tools in the modern attacker’s arsenal….

Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware
07
Nov
2025

Threat Actors Use Stolen RDP Credentials to Deploy Cephalus Ransomware

A new ransomware group, Cephalus, has emerged in the cybersecurity threat landscape, targeting organizations through compromised Remote Desktop Protocol (RDP)…

German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure
07
Nov
2025

German ISP aurologic GmbH Identified as Key Hub for Malicious Hosting Infrastructure

German hosting provider aurologic GmbH has emerged as a critical hub within the global malicious infrastructure ecosystem, according to recent…