Aggregator
【资料】深度伪造即服务(DaaS)威胁分析报告
China-based SMS Phishing Triad Pivots to Banks
Alleged Data for Sale of Origin PC
Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed
A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave over 100,000 websites at risk. The issue, discovered by security researcher mikemyers, allows attackers to create rogue administrative users on sites where the plugin is not properly configured. Vulnerability Details This critical flaw, registered as CVE-2025-3102, is rooted in the plugin’s […]
The post Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The State of AI Malware and Defenses Against It
AI has recently been added to the list of things that keep cybersecurity leaders awake. The increasing popularity of and easy access to large language models (LLMs), such as ChatGPT, DeepSeek, and Gemini, have enabled threat actors to scale and personalize their attacks. Organizations need to adapt their cyber defenses based on this trend. But […]
The post The State of AI Malware and Defenses Against It appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks
The threat actor known as GOFFEE has launched a series of targeted attacks against critical sectors within the Russian Federation, utilizing advanced malware and phishing techniques. The group’s latest campaign involves the deployment of PowerModul, a PowerShell-based implant, to escalate their intrusion capabilities and carry out coordinated strikes effectively. PowerModul and Initial Infection Vectors PowerModul […]
The post GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear
A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat to global network infrastructure due to widespread misconfigurations and exploitation by state-sponsored threat actors. The flaw allows unauthenticated attackers to execute arbitrary code on Cisco switches and routers via exposed Smart Install Client services, enabling configuration theft, credential harvesting, and firmware […]
The post A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
RansomHub RaaS in Disarray After Affiliate Chat Access Suddenly Revoked
RansomHub, a leading Ransomware-as-a-Service (RaaS) group that emerged in early 2024, has found itself grappling with internal turmoil. The instability came to light on April 1st, 2025, when several of its client chat portals, critical for ransomware negotiations, went offline, signaling potential internal strife. Affiliate Confusion and Infrastructure Breakdown RansomHub’s affiliates, who had been promised […]
The post RansomHub RaaS in Disarray After Affiliate Chat Access Suddenly Revoked appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Google Cloud: China Achieves “Cyber Superpower” Status
Microsoft: Licensing issue blocks Microsoft 365 Family for some users
Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms
Sapphire Werewolf has introduced a potent new weapon into its cyber arsenal, unveiling the latest iteration of the Amethyst stealer in a calculated phishing attack against an energy firm. According to the Report, the operation cunningly disguises a malicious payload as a mundane HR memo. The threat actor begins its attack with a fraudulent email, […]
The post Sapphire Werewolf Upgrades Arsenal With Amethyst Stealer Targeting Energy Firms appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.