Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.
CVE/vulnerability
Apache ActiveMQ Vulnerability Lets Remote Hackers Execute Arbitrary Code
A high vulnerability in Apache ActiveMQ’s .NET Message Service (NMS) library has been uncovered, enabling remote attackers to execute arbitrary code on unpatched systems.
Tracked...
Azure
Commvault Confirms Zero-Day Attack Breached Its Azure Cloud Environment
Commvault, a global leader in data protection and information management, has confirmed that a sophisticated cyberattack involving a zero-day vulnerability breached its Azure cloud...
Cyber Security News
FBI Uncovers 42,000 Phishing Domains Tied to LabHost PhaaS Operation
The Federal Bureau of Investigation (FBI) has revealed the existence of 42,000 phishing domains associated with the notorious LabHost phishing-as-a-service (PhaaS) platform.
This operation, which...
Cyber Security News
Tor Browser 14.5.1 Released with Enhanced Security and New Features
The Tor Project has announced the official release of Tor Browser 14.5.1, introducing a host of security improvements and new features designed to bolster...
Cyber Security News
Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks
Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing Simulator, designed to empower organizations in proactively identifying and mitigating...
Cyber Attack
AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens
Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been exploiting legitimate Software-as-a-Service (SaaS) platforms like Milanote to orchestrate sophisticated...
Cyber Attack
Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations
Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising strategies.
Recent investigations have uncovered a disturbingly effective method involving fake...
cryptocurrency
Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams
Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat actors in investment scams, which, according to the Federal Trade...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.