Friday, March 7, 2025

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data

In a recent study published by Palo Alto Networks' Threat Research Center, researchers successfully jailbroke 17 popular generative AI (GenAI) web products, exposing vulnerabilities...

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware

A sophisticated malware operation, dubbed "Phantom Goblin," has been identified by cybersecurity researchers, highlighting the increasing use of social engineering tactics to deploy information-stealing...

GitHub Explains How Security Professionals Can Use Copilot for Log Analysis

GitHub Copilot, once a developer-centric tool, is now revolutionizing workflows across technical and non-technical roles.With features like Agent Mode, CLI integration, and Project...

Microsoft Introduces 365 E5 Security Add-On for Business Premium Customers

Microsoft has launched Microsoft 365 E5 Security as an add-on to its Business Premium suite, providing small and medium-sized businesses (SMBs) with advanced tools...

AMD Microcode Vulnerability Allows Attackers to Load Malicious Patches

A critical vulnerability in AMD’s Zen 1 through Zen 4 processors allows attackers to bypass microcode signature validation, potentially undermining hardware-based security mechanisms.The...

Activating Incognito Mode in RDP to Erase All Traces

The Remote Desktop Protocol (RDP) is a widely used tool for remote access, but it often leaves behind traces of user activity, which can...

Medusa Ransomware Attacks Surge 42% with Advanced Tools & Tactics

Medusa ransomware attacks have seen a significant increase, rising by 42% between 2023 and 2024, with a further escalation in early 2025.This surge...

Peaklight Malware Targets Users to Steal Credentials, Browser History, and Financial Data

Peaklight malware has emerged as a significant threat, designed to steal sensitive information from compromised endpoints.This information stealer is often distributed through underground...

Join our community of SUBSCRIBERS and be part of the conversation.

To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.