Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Signal Introduces Hybrid Post-Quantum Ratchet to Strengthen Security

Signal, the popular end-to-end encrypted messaging platform, has announced a groundbreaking advancement in cryptographic security with the introduction of the Sparse Post Quantum Ratchet (SPQR). This innovative protocol represents a significant leap forward in protecting user communications against emerging quantum…

New Obex Tools Blocks Runtime Loading of EDR Dynamic Libraries

Obex, a newly released proof-of-concept utility by security researcher dis0rder0x00, demonstrates a simple but effective user-mode method to stop unwanted security and monitoring modules from loading into Windows processes. The tool launches a target process under debugger control and enforces…

Termix Docker Image Leaking SSH Credentials (CVE-2025-59951)

A critical vulnerability in the official Termix Docker image puts users at risk of exposing sensitive SSH credentials. The flaw allows anyone with network access to retrieve stored host addresses, usernames, and passwords without logging in. How the Vulnerability Works…

Chrome Security Update Addressing 21 Vulnerabilities

The Chrome team has released Chrome 141.0.7390.54/55 to the stable channel for Windows, Mac, and Linux, rolling out over the coming days and weeks. This update delivers critical security fixes, including 21 distinct vulnerabilities that span high, medium, and low severity. External…

Google Drive Desktop Gets AI-Powered Ransomware Detection to Block Cyberattacks

Google has unveiled a groundbreaking AI-powered ransomware detection system for its Drive desktop application, representing a significant advancement in cybersecurity protection for organizations worldwide. This innovative feature automatically halts file synchronization when malicious encryption attempts are detected, preventing widespread data…

Top 10 Best Vulnerability Management Software in 2025

In today’s fast-paced digital environment, organizations face constant threats from cybercriminals exploiting weaknesses in IT systems. Vulnerability management software is one of the most crucial elements in safeguarding a network, as it helps identify, evaluate, and remediate security gaps before…

Senior Travel Scams Used by Threat Actors to Distribute Datzbro Malware

In August 2025, Australian authorities issued multiple scam alerts after users reported suspicious Facebook groups promoting “active senior trips.” What initially appeared as harmless community gatherings concealed a sophisticated mobile malware operation. ThreatFabric researchers uncovered that these groups were managed…

Top 100 World’s Best Cybersecurity Companies in 2025

The digital landscape in 2025 is characterized by unprecedented connectivity and an equally sophisticated array of cyber threats. Organizations face a constant barrage of attacks targeting their data, infrastructure, and reputation. Selecting the right cybersecurity partners has become a mission-critical…