Category: GBHackers

Microsoft Defender AI Can Detect Plaintext Credentials in Active Directory
19
Aug
2025

Microsoft Defender AI Can Detect Plaintext Credentials in Active Directory

Microsoft has unveiled a new AI-powered security capability that addresses one of cybersecurity’s most persistent vulnerabilities: plaintext credentials stored in…

PyPI Blocks Expired Domain Access to Prevent Resurrection Attacks
19
Aug
2025

PyPI Blocks Expired Domain Access to Prevent Resurrection Attacks

The Python Package Index (PyPI) has implemented new security measures to protect against domain resurrection attacks, a sophisticated supply-chain threat…

New Sni5Gect Attack Targets 5G to Steal Messages and Inject Payloads
19
Aug
2025

New Sni5Gect Attack Targets 5G to Steal Messages and Inject Payloads

Cybersecurity researchers at Singapore University of Technology and Design have unveiled a sophisticated new attack framework called SNI5GECT that can intercept 5G…

Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process
19
Aug
2025

Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process

A recent reverse engineering analysis of a Lockbit ransomware variant targeting Linux-based ESXi servers has uncovered several sophisticated evasion techniques…

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware
19
Aug
2025

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware

The PipeMagic malware, which is credited to the financially motivated threat actor Storm-2460, is a remarkable illustration of how cyber…

Malicious npm Packages Target Crypto Developers to Steal Login Credentials
19
Aug
2025

Malicious npm Packages Target Crypto Developers to Steal Login Credentials

A sophisticated threat campaign dubbed “Solana-Scan” has emerged, deploying malicious npm packages aimed at infiltrating the Solana cryptocurrency ecosystem. Identified…

CISA Alerts on Active Exploitation of Trend Micro Apex One Vulnerability
19
Aug
2025

CISA Alerts on Active Exploitation of Trend Micro Apex One Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Trend Micro Apex One vulnerability to its Known Exploited…

Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters
19
Aug
2025

Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters

Cybercriminals have discovered a sophisticated new attack vector that weaponizes Cisco’s security infrastructure against users, according to recent research from…

Intel Websites Compromised, Allowing Hackers Access to Employee Data
19
Aug
2025

Intel Websites Compromised, Allowing Hackers Access to Employee Data

A series of critical security flaws in Intel’s internal web infrastructure exposed the personal details of more than 270,000 employees…

Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers
19
Aug
2025

Threat Actors Use Pirated Games to Bypass Microsoft Defender SmartScreen and Adblockers

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage pirated game downloads to distribute HijackLoader, a modular malware…

Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan
18
Aug
2025

Blue Locker Ransomware Launches Targeted Attacks on the Oil and Gas Sector in Pakistan

Pakistan’s National Cyber Emergency Response Team (NCERT) has issued a high-alert advisory to 39 key ministries and institutions, warning of…

Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware
18
Aug
2025

Threat Actors Exploit Microsoft Help Index File to Deploy PipeMagic Malware

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors leverage a Microsoft Help Index File (.mshi) to deploy the…