Friday, March 7, 2025

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Critical DrayTek Router Vulnerabilities Expose Devices to RCE Attacks

A recent security analysis of Draytek Vigor routers has uncovered severe vulnerabilities that could allow attackers to hijack devices, execute arbitrary code, and bypass...

Multiple Jenkins Vulnerabilities Allow Attackers to Expose Secrets

Jenkins, the widely-used open-source automation server, issued a high-priority security advisory on March 5, 2025, disclosing four medium-severity vulnerabilities affecting its core platform.The...

YouTube Alerts Creators About Phishing Emails Targeting Login Credentials

YouTube has issued a critical security advisory following a widespread phishing campaign exploiting private video sharing to distribute AI-generated deepfakes of CEO Neal Mohan....

Researchers Jailbreak 17 Popular LLM Models to Reveal Sensitive Data

In a recent study published by Palo Alto Networks' Threat Research Center, researchers successfully jailbroke 17 popular generative AI (GenAI) web products, exposing vulnerabilities...

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware

A sophisticated malware operation, dubbed "Phantom Goblin," has been identified by cybersecurity researchers, highlighting the increasing use of social engineering tactics to deploy information-stealing...

GitHub Explains How Security Professionals Can Use Copilot for Log Analysis

GitHub Copilot, once a developer-centric tool, is now revolutionizing workflows across technical and non-technical roles.With features like Agent Mode, CLI integration, and Project...

Microsoft Introduces 365 E5 Security Add-On for Business Premium Customers

Microsoft has launched Microsoft 365 E5 Security as an add-on to its Business Premium suite, providing small and medium-sized businesses (SMBs) with advanced tools...

AMD Microcode Vulnerability Allows Attackers to Load Malicious Patches

A critical vulnerability in AMD’s Zen 1 through Zen 4 processors allows attackers to bypass microcode signature validation, potentially undermining hardware-based security mechanisms.The...

Join our community of SUBSCRIBERS and be part of the conversation.

To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.