In recent years, phishing has remained the most prevalent form of cyberattack, with approximately 1.2% of global email traffic being phishing attempts, amounting to about 3.4 billion emails daily. Despite a low success rate, with only 3% of employees clicking…
Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Enhanced XCSSET Malware Targets macOS Users with Advanced Obfuscation
Microsoft Threat Intelligence has recently uncovered a new variant of the XCSSET malware, a sophisticated modular macOS malware known for infecting Xcode projects. This latest iteration features enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies, making it more…
Chinese Hackers Deploy New ‘Squidoor’ Malware to Target Global Organizations
A recent cybersecurity threat has emerged in the form of a sophisticated backdoor malware named Squidoor, attributed to a suspected Chinese threat actor. This malware has been targeting various sectors globally, including governments, defense, telecommunications, education, and aviation, particularly in…
Jaguar Land Rover Allegedly Hacked – 700 Internal Documents Including Source Code Leaked
A threat actor known as “Rey” has come forward on a prominent dark web forum, claiming responsibility for a significant cyberattack on Jaguar Land Rover. The British multinational automotive company, renowned for its luxury and off-road vehicles, is said to…
CISA Warns of Windows NTFS Vulnerability Exploited for Data Theft
The Cybersecurity and Infrastructure Security Agency (CISA) highlighted a critical vulnerability in Microsoft Windows’ New Technology File System (NTFS). The vulnerability, designated as CVE-2025-24984, pertains to an information disclosure issue that could potentially allow attackers to access sensitive data stored…
Jaguar Land Rover Allegedly Hit by Cyberattack, Hacker Claims
A threat actor known as “Rey” has come forward on a prominent dark web forum, claiming responsibility for a significant cyberattack on Jaguar Land Rover. The British multinational automotive company, renowned for its luxury and off-road vehicles, is said to…
Zoom Client Security Flaws Could Lead to Data Breaches
Recent security bulletins from Zoom have highlighted several high-severity vulnerabilities in their client software, raising concerns about potential data breaches for users. The latest security updates, issued on March 11, 2025, address multiple critical issues that could impact the privacy…
CISA Alerts on Active Exploitation of Microsoft Windows MMC Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the active exploitation of a significant vulnerability in Microsoft Windows affecting the Microsoft Management Console (MMC). This security threat underscores the ongoing challenges faced by organizations in managing vulnerabilities and…
macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel
Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS. These occur when software attempts to access memory at address 0 via a NULL pointer, leading to potential crashes or, under certain conditions, exploitation by attackers.…
Ebyte Ransomware Targets Windows Users with Advanced Encryption Techniques
A new ransomware variant, known as Ebyte Ransomware, has emerged as a significant threat to Windows users. Developed in the Go programming language, this ransomware employs sophisticated encryption techniques, including ChaCha20 and Elliptic Curve Integrated Encryption Scheme (ECIES), to lock…