A new variant of the FOG ransomware has been identified, with attackers exploiting the name of the Department of Government Efficiency (DOGE) to mislead victims. This operation, which came to light through the analysis of nine malware samples uploaded to…
Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Ransomware Attacks Cost Banks $6.08 Million on Average, Triggering Downtime and Reputation Damage
In an era where cybersecurity has become paramount, the banking and financial sectors are facing an alarming escalation in ransomware attacks. According to recent findings, each ransomware attack costs banks an average of $6.08 million, excluding the additional expenses on…
VibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack Models
Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed “VibeScamming,” where cybercriminals are using AI tools to create sophisticated phishing campaigns with unprecedented ease. This development, which allows even novice hackers to craft convincing scams, marks a…
Hackers Exploit Stolen Certificates and Private Keys to Breach Organizations
Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates and private keys to infiltrate organizations. This tactic not only allows hackers to bypass security measures but also potentially permits…
RedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack Tools
Security researchers have linked the notorious RedGolf hacking group to a wave of exploits targeting Fortinet firewall zero-days and the deployment of custom cyber attack tools. The exposure of a misconfigured server tied to the KeyPlug malware—a hallmark of RedGolf…
Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR
A notorious threat actor has allegedly begun selling “Baldwin Killer,” a sophisticated malware toolkit designed to bypass leading antivirus (AV) and endpoint detection and response (EDR) systems. The tool, advertised on dark web forums, claims to circumvent security solutions such…
Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store
A newly documented technique reveals how attackers can exploit the WinDbg Preview debugger to bypass even the strictest Windows Defender Application Control (WDAC) policies, raising concerns about a significant gap in enterprise security controls. The exploit, dubbed the “WinDbg Preview…
Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations
The Chinese hacker group known as Billbug, or Lotus Blossom, targeted high-profile organizations across Southeast Asia. The attackers, who were previously documented by Symantec and later Cisco Talos, employed a variety of new custom tools, alongside novel techniques like DLL…
New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools
Researchers have unveiled a sophisticated new technique that allows attackers to bypass traditional Antivirus (AV) and Endpoint Detection and Response (EDR) solutions. By exploiting how these defensive tools analyze command-line arguments—a core method of detecting suspicious activity—malicious actors can now…
RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions
The AhnLab SEcurity intelligence Center (ASEC) has released a detailed analysis of a sophisticated cyber campaign dubbed “Larva-24005,” linked to the notorious North Korean hacking group Kimsuky. This operation has been targeting critical sectors in South Korea, including software, energy,…
Linux 6.15-rc3 Released With Key Kernel Bug Fixes
Linus Torvalds announced the release of Linux 6.15-rc3, delivering a fresh batch of bug fixes and minor adjustments to the ever-evolving Linux kernel. As is customary, the release candidate comes right on schedule, arriving just after the weekend—this time, coinciding…
Hackers Abuse Zoom’s Remote Control to Access Users’ Computers
A newly uncovered hacking campaign is targeting business leaders and cryptocurrency firms by abusing Zoom’s remote control feature, allowing attackers to take over victims’ computers with a single click. The sophisticated operation, attributed to a threat group known as ELUSIVE…
Speedify VPN Vulnerability on macOS Exposes Users to System Takeover
A major security flaw in the Speedify VPN application for macOS, tracked as CVE-2025-25364, has exposed millions of users to the risk of complete system compromise. Researchers at SecureLayer7 discovered the vulnerability in Speedify’s privileged helper tool. It could potentially allow…
ASUS Router Flaw Allows Hackers to Remotely Execute Malicious Code
ASUS has acknowledged multiple critical vulnerabilities affecting its routers that could allow hackers to remotely execute malicious code, thereby compromising network security and user privacy. These flaws highlight the continuous challenges in securing IoT and networking devices against increasingly sophisticated…
Critical PyTorch Vulnerability Allows Hackers to Run Remote Code
A newly disclosed critical vulnerability (CVE-2025-32434) in PyTorch, the widely used open-source machine learning framework, allows attackers to execute arbitrary code on systems loading AI models—even when safety measures like weights_only=True are enabled. The flaw impacts all PyTorch versions ≤2.5.1 and has…
Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security
A sophisticated phishing attack exploiting a loophole in Google’s OAuth infrastructure has surfaced, raising significant concerns about the security of Gmail users worldwide. Security researcher Nick Johnson (@nicksdjohnson) recently shared details of the attack via social media, underscoring the urgent…
Writing Effective Detection Rules With Sigma, YARA, And Suricata
In the ever-evolving world of cybersecurity, the ability to detect threats quickly and accurately is crucial for defending modern digital environments. Detection rules are the backbone of this proactive defense, enabling security teams to spot suspicious activities, malware, and network…
Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds
Organizations today face an ever-expanding threat landscape that requires sophisticated detection capabilities to identify and mitigate attacks before they cause damage. By analyzing Web Application Firewall (WAF) logs and incorporating external threat intelligence feeds, security teams can create powerful detection…
How To Conduct End-to-End Forensics From Compromised Endpoint To Network Pivot
The discovery of a compromised endpoint in an organization’s network marks the beginning of what can be a complex forensic investigation. End-to-end forensics involves a systematic approach to investigate, analyze, and document how an attack originated at an endpoint and…
10 Best Patch Management Tools 2025
In today’s digital landscape, maintaining secure and efficient IT systems is critical for organizations. Patch management tools play a vital role in achieving this by automating the process of identifying, testing, and deploying software updates and security patches across various…