Category: GBHackers

Over 60 Malicious RubyGems Packages Used to Steal Social Media and Marketing Credentials
08
Aug
2025

Over 60 Malicious RubyGems Packages Used to Steal Social Media and Marketing Credentials

Socket’s Threat Research Team has exposed a persistent campaign involving over 60 malicious RubyGems packages that masquerade as automation tools…

CISA Issues Urgent Advisory to Address Microsoft Exchange Flaw
08
Aug
2025

CISA Issues Urgent Advisory to Address Microsoft Exchange Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-02 on August 7, 2025, requiring federal agencies to…

Flipper Zero Dark Web Firmware Cracks Rolling Code Security in Modern Cars
08
Aug
2025

Flipper Zero Dark Web Firmware Cracks Rolling Code Security in Modern Cars

Security researchers have discovered alarming new firmware for the popular Flipper Zero device that can completely bypass the rolling code…

Retbleed Vulnerability Exploited to Access Any Process’s Memory on Newer CPUs
08
Aug
2025

Retbleed Vulnerability Exploited to Access Any Process’s Memory on Newer CPUs

Security researchers have successfully demonstrated a sophisticated exploit of the Retbleed vulnerability, a critical CPU security flaw that allows attackers to…

HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks
07
Aug
2025

HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks

Researchers at Cyata have disclosed nine previously unknown zero-day vulnerabilities in HashiCorp Vault, a widely adopted open-source secrets management platform,…

How Machine Learning Detects Living off the Land (LotL) Attacks
07
Aug
2025

How Machine Learning Detects Living off the Land (LotL) Attacks

Elite cybercriminals prefer LotL attacks because they’re incredibly hard to spot. Instead of deploying obvious malware, attackers use the same…

Splunk Unveils PLoB Tool to Detect Compromised Credential Usage
07
Aug
2025

Splunk Unveils PLoB Tool to Detect Compromised Credential Usage

Splunk has introduced PLoB (Post-Logon Behaviour Fingerprinting and Detection) in a world where compromised credentials remain the primary vector for…

Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems
07
Aug
2025

Hackers Exploit SVG Files with Embedded JavaScript to Deploy Malware on Windows Systems

Threat actors are increasingly using Scalable Vector Graphics (SVG) files to get beyond traditional defenses in the quickly developing field…

Gemini AI Exploited via Google Invite Prompt Injection to Steal Sensitive User Data
07
Aug
2025

Gemini AI Exploited via Google Invite Prompt Injection to Steal Sensitive User Data

Security researchers have discovered a series of critical vulnerabilities in Google’s Gemini AI assistant that allow attackers to exploit the…

Weaponizing Microsoft 365 Direct Send to Bypass Email Security Defenses
07
Aug
2025

Weaponizing Microsoft 365 Direct Send to Bypass Email Security Defenses

Security researchers at StrongestLayer, in collaboration with Jeremy, a seasoned Security Architect at a major manufacturing firm, have exposed a…

Hacker Extradited to U.S. for $2.5 Million Tax Fraud Scheme
07
Aug
2025

Hacker Extradited to U.S. for $2.5 Million Tax Fraud Scheme

Chukwuemeka Victor Amachukwu, also known as Chukwuemeka Victor Eletuo and So Kwan Leung, was extradited from France to the United…

ScarCruft Hacker Group Launches New Rust-Based Malware Attack Leveraging PubNub
07
Aug
2025

ScarCruft Hacker Group Launches New Rust-Based Malware Attack Leveraging PubNub

The North Korean state-sponsored advanced persistent threat (APT) group known as ScarCruft has been linked to a sophisticated malware campaign…