A recent development in Linux kernel security has led to the creation of a Rust-based kernel module designed to detect rootkits, a type of malware that can hide itself and other malicious activities from system administrators. This project, part of…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Cyber Guardians: INE Trains Security Champions in Cybersecurity for National Physicians Week 2025
Cary, NC, March 24th, 2025, CyberNewsWire INE Security, a global provider of cybersecurity training and certification, today announced its initiative to spotlight the increasing cyber threats targeting healthcare institutions. In recognition of National Physicians Week 2025, the company is drawing attention…
Four Members of Hacker Group Behind 90 Worldwide Data Breaches Exposed
A recent investigation by Group-IB has shed light on a notorious cybercriminal operating under multiple aliases, including ALTDOS, DESORDEN, GHOSTR, and 0mid16B. This individual was responsible for over 90 data breaches globally, primarily targeting companies in Asia and other regions.…
Enhancing Satellite Security by Encrypting Video Data Directly on Payloads
The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for secure video transmission in satellite communication systems. Applications such as remote sensing, disaster relief, and secure information exchange rely heavily on video data, which is increasingly…
Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails
Clio is a cutting-edge, secure logging platform designed specifically for red team operations and security assessments. This collaborative tool offers real-time logging capabilities, allowing multiple users to view and edit logs simultaneously. It incorporates a row-level locking mechanism to prevent…
CleanStack: Dual-Stack Solution to Defend Against Memory Corruption Attacks
CleanStack is a novel stack protection mechanism designed to combat memory corruption attacks, which have long been a significant threat to software systems. These attacks exploit vulnerabilities in low-level languages like C/C++ to execute arbitrary code or manipulate memory operations.…
Operation Red Card: Authorities Arrest 300+ Linked to Cyber Attacks
An INTERPOL-led operation, dubbed “Operation Red Card,” has resulted in the arrest of over 306 individuals suspected of involvement in various cyber crimes across seven African countries. This operation, conducted from November 2024 to February 2025, targeted mobile banking, investment,…
VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems
VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime ecosystem. Introduced on March 7, 2025, this RaaS platform offers affiliates a cross-platform ransomware tool capable of targeting diverse systems, including Linux, BSD, ARM architectures, and…
FCC Investigates Chinese Entities on US Government’s Prohibited List
The Federal Communications Commission (FCC) has initiated a new investigation into Chinese entities previously identified as national security risks to ensure these companies are not circumventing U.S. regulations. FCC Chairman Brendan Carr announced the move today as the first major…
Chinese ‘Web Shell Whisperer’ Leverages Shells and Tunnels to Establish Stealthy Persistence
A recent cyber espionage operation by a China-nexus threat actor, dubbed “Weaver Ant,” has been uncovered by Sygnia, a cybersecurity firm. This sophisticated threat actor targeted a major telecommunications company in Asia, utilizing web shells and tunneling techniques to maintain…