Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.
AI
Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data
In a recent study published by Palo Alto Networks' Threat Research Center, researchers successfully jailbroke 17 popular generative AI (GenAI) web products, exposing vulnerabilities...
cyber security
Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware
A sophisticated malware operation, dubbed "Phantom Goblin," has been identified by cybersecurity researchers, highlighting the increasing use of social engineering tactics to deploy information-stealing...
cyber security
GitHub Explains How Security Professionals Can Use Copilot for Log Analysis
GitHub Copilot, once a developer-centric tool, is now revolutionizing workflows across technical and non-technical roles.With features like Agent Mode, CLI integration, and Project...
cyber security
Microsoft Introduces 365 E5 Security Add-On for Business Premium Customers
Microsoft has launched Microsoft 365 E5 Security as an add-on to its Business Premium suite, providing small and medium-sized businesses (SMBs) with advanced tools...
AMD
AMD Microcode Vulnerability Allows Attackers to Load Malicious Patches
A critical vulnerability in AMD’s Zen 1 through Zen 4 processors allows attackers to bypass microcode signature validation, potentially undermining hardware-based security mechanisms.The...
Browser
Activating Incognito Mode in RDP to Erase All Traces
The Remote Desktop Protocol (RDP) is a widely used tool for remote access, but it often leaves behind traces of user activity, which can...
cyber security
Medusa Ransomware Attacks Surge 42% with Advanced Tools & Tactics
Medusa ransomware attacks have seen a significant increase, rising by 42% between 2023 and 2024, with a further escalation in early 2025.This surge...
Browser
Peaklight Malware Targets Users to Steal Credentials, Browser History, and Financial Data
Peaklight malware has emerged as a significant threat, designed to steal sensitive information from compromised endpoints.This information stealer is often distributed through underground...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.