Please turn JavaScript on
header-image

GBHackers On Security

Following GBHackers On Security's news feed is very easy. Subscribe using the "follow" button on the top right and if you want to, choose the updates by topic or tag.

We will deliver them to your inbox, your phone, or you can use Specificfeeds like your own online RSS reader. You can unsubscribe whenever you want with one click.

Keep up to date with GBHackers On Security!

GBHackers On Security: GBHackers - Latest Cyber Security News | Hacker News

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  7.57 / day

Message History

AI-generated phishing is rapidly reshaping email risk, with more attacks slipping past filters and landing directly in users’ inboxes, even though AI-generated emails remain a minority of total phishing. The human element remains central: 68% of breaches involve people, and 80–95% of those begin with phishing, making social engineering the dominant breach vector. Phishing vol...


Read full story

A newly uncovered malware campaign dubbed KadNap has silently conscripted more than 14,000 internet‑exposed routers and edge devices into a stealth proxy botnet, with Asus routers the primary victims. More than 60% of known victims are located in the United States, with additional infections observed in Taiwan, Hong Kong, Russia, and other countriesHow KadNap Infect...


Read full story

A new wave of ClickFix campaigns targeting macOS users and delivering the MacSync infostealer, signaling a growing shift in threat actor tactics against Apple devices. The attacks rely heavily on social engineering rather than software exploits, tricking users into manually executing malicious commands in macOS Terminal. ClickFix is a deceptive technique where attackers prese...


Read full story

Threat actors are increasingly exploiting legitimate Remote Monitoring and Management (RMM) tools to breach corporate networks and establish persistent access. This tactic allows attackers to bypass traditional security defenses by blending malicious activities with routine administrative tasks. The Surge of RMM Abuse The exploitation of remote management software has become ...


Read full story

A recent Microsoft 365 credential harvesting campaign shows how attackers are exploiting CloudFlare’s protective features to shield malicious phishing sites from security scanners and threat researchers. CloudFlare is widely used by organizations to improve website performance and protect against attacks such as bots, DDoS, and automated scanning. However, these same protecti...


Read full story