GB Hacker
-
Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums
A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale on a notorious hacker forum. This exploit, which has not...
-
Armis Acquires AI-based Vulnerability Detection Firm Silk Security
Armis, a leading cybersecurity company, has acquired Silk Security, an AI-powered vulnerability detection firm. The acquisition comes when...
-
INC Ransom Group Exfiltrates Data Before Encrypting & Threatens Public Exposure
Hackers exfiltrate data first before encrypting it to increase their bargaining power during ransom negotiations. Threats of public exposure...
-
NSA, CISA & FBI Released Best Practices For AI Security Deployment 2024
In a groundbreaking move, the U.S. Department of Defense has released a comprehensive guide for organizations deploying and operating AI systems...
-
LightSpy Malware Attacking Android and iOS Users
A new malware known as LightSpy has been targeting Android and iOS users. This sophisticated surveillance tool raises alarms across the...
-
Cyber Attack Surge by 28%:Education Sector at High Risk
In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average number of cyber attacks per organization per week, reaching...
-
Cyber Espionage: Turla APT Hackers Attack European Organization With Backdoor
Cybersecurity experts have uncovered a failed attempt by the notorious Russia-based Turla Advanced Persistent Threat (APT) group to infiltrate...
-
New SharePoint Technique Lets Hackers Bypass Security Measures
Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without...
-
Google Rolls Out “Find My Device” Network for Android Users
Google has announced the global rollout of its revamped Find My Device network. This innovative feature is set to transform how Android...
-
Cloudflare Acquires Baselime to Enhance Serverless Performance
Cloudflare has announced its acquisition of Baselime, a pioneering observability platform designed to simplify the complexities of serverless...
-
Microsoft Two-Step Phishing Campaign Attack LinkedIn Users
The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly used for...
-
AI Package Hallucination – Hackers Abusing ChatGPT, Gemini to Spread Malware
The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages....