Security researchers have uncovered a new attack campaign by the North Korean state-sponsored APT group Kimsuky, also known as “Black Banshee.” The group, active since at least 2012, has been observed employing advanced tactics and malicious scripts in their latest…
Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Clevo Devices Vulnerable as Boot Guard Private Key Leaks via Firmware Updates
A recent investigation has revealed that several Clevo-based devices are vulnerable due to a leak of Boot Guard private keys. This vulnerability was first reported on the Win-Raid forum and involves firmware updates containing sensitive Boot Guard Key Manifest (KM)…
DrayTek Router Vulnerability Exploited in the Wild – Linked to Reboot Loop Issue
The cybersecurity world has been abuzz with reports of widespread reboots affecting DrayTek routers across the globe. While the exact cause of these reboots remains largely unconfirmed, GreyNoise has brought to light significant in-the-wild exploitation of several known vulnerabilities in…
Appsmith Developer Tool Vulnerability Exposes Systems to Remote Code Execution
A recent analysis by Rhino Security Labs has uncovered a series of critical vulnerabilities in the Appsmith developer tool, a platform used for building internal applications such as dashboards and customer support tools. The most severe of these vulnerabilities is…
Google Chrome Zero-Day Vulnerability Actively Exploited in the Wild
Google has released an urgent update for its Chrome browser to patch a zero-day vulnerability known as CVE-2025-2783. This vulnerability has been actively exploited in targeted attacks, utilizing sophisticated malware to bypass Chrome’s sandbox protections. The update, version 134.0.6998.177 for…
CISA Highlights Four ICS Flaws Being Actively Exploited
The Cybersecurity and Infrastructure Security Agency (CISA) released four significant Industrial Control Systems (ICS) advisories, drawing attention to potential security risks and vulnerabilities affecting various industrial control equipment. These advisories underscore the imperative for prompt action to mitigate these threats,…
New Windows Zero-Day Vulnerability Exposes NTLM Credentials – Unofficial Patch Available
A new zero-day vulnerability has been discovered in Windows, impacting all versions from Windows 7 and Server 2008 R2 to the latest Windows 11 v24H2 and Server 2025. This vulnerability allows attackers to obtain NTLM credentials by tricking users into…
Malicious AI Tools See 200% Surge as ChatGPT Jailbreaking Talks Increase by 52%
The cybersecurity landscape in 2024 witnessed a significant escalation in AI-related threats, with malicious actors increasingly targeting and exploiting large language models (LLMs). According to KELA’s annual “State of Cybercrime” report, discussions about exploiting popular LLMs such as ChatGPT, Copilot,…
Cybercriminals Bypass Security Using Legitimate Tools & Browser Extensions to Deliver Malware
In the second half of 2024, cybercriminals have increasingly leveraged legitimate Microsoft tools and browser extensions to bypass security measures and deliver malware, according to Ontinue’s latest Threat Intelligence Report. Threat actors are exploiting built-in Microsoft features like Quick Assist…
New Phishing Campaign Targets Mac Users to Steal Login Credentials
A sophisticated phishing campaign, recently identified by LayerX Labs, has shifted its focus from Windows users to Mac users in response to enhanced security measures implemented by major browsers. Initially, this campaign targeted Windows users by masquerading as Microsoft security…
IDT Corporation Partners with AccuKnox for Zero Trust Runtime IoT/Edge Security
Menlo Park, United States, March 25th, 2025, CyberNewsWire FinTech and Communications Leader, IDT Corporation partners with AccuKnox to deploy runtime security-powered CNAPP (Cloud Native Application Protection Platform) for IoT/Edge Security. AccuKnox, Inc., announced that Telecom and FinTech Leader IDT Corporation has partnered with AccuKnox…
ARACNE: LLM-Powered Pentesting Agent Executes Commands on Real Linux Shell Systems
Researchers have introduced ARACNE, a fully autonomous Large Language Model (LLM)-based pentesting agent designed to interact with SSH services on real Linux shell systems. ARACNE is engineered to execute commands autonomously, marking a significant advancement in the automation of cybersecurity…
Researchers Compare Malware Development in Rust vs C and C++
Security researcher Nick Cerne from Bishop Fox has published findings comparing malware development in Rust versus traditional C/C++ languages. The research demonstrates how Rust provides inherent anti-analysis features that make malware more difficult to reverse engineer. According to Cerne’s analysis,…
Banking Malware Infects 248,000 Mobile Users Through Social Engineering Techniques
In 2024, the number of users affected by mobile banking malware skyrocketed to nearly 248,000, a staggering 3.6-fold increase from the previous year’s 69,000 affected users. This dramatic rise in malicious activity was particularly pronounced in the latter half of…
Active Roles Secures 2025 Cybersecurity Excellence Award for Hybrid AD Protection
Alisa Viejo, United States, March 25th, 2025, CyberNewsWire One Identity, a leader in unified identity security, today announced that One Identity Active Roles has been named a winner in the Hybrid Active Directory Protection category of the 2025 Cybersecurity Excellence Awards. This…
Gartner Names CYREBRO in Emerging Tech Report for Detection & Response Startups
Ramat Gan, Israel, March 25th, 2025, CyberNewsWire CYREBRO, the AI-native Managed Detection and Response (MDR), today announced its recognition as a leading detection and response startup in the Gartner report, Emerging Tech: Techscape for Detection and Response Startups. This acknowledgment…
ARMO Unveils First Cloud App Detection & Response Solution for Seamless Code-to-Cloud Security
Tel Aviv, Israel, March 25th, 2025, CyberNewsWire ARMO CADR minimizes the cloud attack surface, detects and responds to unknown and known cyberattacks while ensuring business continuity, combining the power of CDR and ADR solutions ARMO, the leading Cloud Runtime Security company…
New Phishing Attack Uses Browser-in-the-Browser Technique to Target Gamers
A sophisticated phishing campaign has been uncovered by Silent Push threat analysts, employing the browser-in-the-browser (BitB) technique to target gamers, particularly those playing Counter-Strike 2 on the Steam platform. This campaign involves creating fake but realistic browser pop-up windows that…
Malicious VS Code Extensions Target Developers with ShibaCoin Ransomware
Researchers from Reversing Labs have identified two malicious Visual Studio Code (VS Code) extensions that are distributing ransomware to unsuspecting developers. The extensions, named “ahban.shiba” and “ahban.cychelloworld,” are currently under development and pose a significant threat to users who install…
New Specter Insight C2 Tool Fuels ClickFix-Based Hacking Campaigns
A recent cybersecurity investigation has uncovered a previously unidentified Command and Control (C2) framework, dubbed Specter Insight C2. This discovery was made by a team of researchers who have been analyzing recent hacking campaigns, including those utilizing ClickFix tactics, as per a report…