Category: GBHackers

LangChainGo Vulnerability Allows Malicious Prompt Injection to Access Sensitive Data
15
Sep
2025

LangChainGo Vulnerability Allows Malicious Prompt Injection to Access Sensitive Data

A recently discovered flaw in LangChainGo, the Go implementation of the LangChain framework for large language models, permits attackers to…

Hackers using generative AI “ChatGPT” to evade anti-virus defenses
15
Sep
2025

Hackers using generative AI “ChatGPT” to evade anti-virus defenses

The Kimsuky APT group has begun leveraging generative AI ChatGPT to craft deepfake South Korean military agency ID cards. Phishing…

BlackNevas Ransomware Encrypts Files, Exfiltrates Corporate Data
15
Sep
2025

BlackNevas Ransomware Encrypts Files, Exfiltrates Corporate Data

Countries with most cyberattacks stopped highlighting global cyber defense efforts, including key regions in Asia-Pacific and North America.  BlackNevas has…

FBI Releases IOCs on Cyber Threats Exploiting Salesforce for Data Theft
15
Sep
2025

FBI Releases IOCs on Cyber Threats Exploiting Salesforce for Data Theft

The Federal Bureau of Investigation (FBI) has released a detailed flash advisory disclosing indicators of compromise (IOCs) and tactics used…

AppSuite-PDF, PDF Editor Operators Exploited 26 Code-Signing Certificates to Fake Legitimacy
15
Sep
2025

AppSuite-PDF, PDF Editor Operators Exploited 26 Code-Signing Certificates to Fake Legitimacy

Analysis reveals that the developers behind the AppSuite-PDF and PDF Editor campaigns have abused at least 26 distinct code-signing certificates…

Microsoft Warns Windows 11 23H2 Support Ending in 60 Days
15
Sep
2025

Microsoft Warns Windows 11 23H2 Support Ending in 60 Days

Microsoft has issued an urgent reminder to enterprise and educational institutions worldwide about the impending end of support for Windows…

Yurei Ransomware Uses PowerShell to Deploy ChaCha20 File Encryption
15
Sep
2025

Yurei Ransomware Uses PowerShell to Deploy ChaCha20 File Encryption

A newly discovered ransomware group called Yurei has emerged with sophisticated encryption capabilities, targeting organizations through double-extortion tactics while leveraging…

Over 500GB of Sensitive Great Firewall of China Data Leaked Online
15
Sep
2025

Over 500GB of Sensitive Great Firewall of China Data Leaked Online

A massive data breach has exposed the inner workings of China’s internet censorship system, with over 500GB of sensitive documents…

VoidProxy PhaaS Targets Microsoft 365 and Google Accounts in New Campaign
15
Sep
2025

VoidProxy PhaaS Targets Microsoft 365 and Google Accounts in New Campaign

Phishing-as-a-Service operation called VoidProxy that uses advanced adversary-in-the-middle techniques to bypass traditional multi-factor authentication and steal session tokens from Microsoft…

Mustang Panda Uses SnakeDisk USB Worm and Toneshell Backdoor to Target Air-Gap Systems
13
Sep
2025

Mustang Panda Uses SnakeDisk USB Worm and Toneshell Backdoor to Target Air-Gap Systems

IBM X-Force researchers have uncovered sophisticated new malware campaigns orchestrated by the China-aligned threat actor Hive0154, also known as Mustang…

AI Pentesting Tool ‘Villager’ Merges Kali Linux with DeepSeek AI for Automated Security Attacks
13
Sep
2025

AI Pentesting Tool ‘Villager’ Merges Kali Linux with DeepSeek AI for Automated Security Attacks

Security researchers at Straiker’s AI Research (STAR) team have uncovered Villager, an AI-native penetration testing framework developed by Chinese-based group…

New Malvertising Campaign Exploits GitHub Repositories to Distribute Malware
12
Sep
2025

New Malvertising Campaign Exploits GitHub Repositories to Distribute Malware

A sophisticated malvertising campaign has been uncovered targeting unsuspecting users through “dangling commits” in a legitimate GitHub repository. Attackers are…