News

gbhackers. com
gbhackers. com > hackers-exploit-github-copilot-flaw

Hackers Exploit Git Hub Copilot Flaw to Exfiltrate Sensitive Data

7+ hour, 30+ min ago  (334+ words) A high-severity flaw in Git Hub Copilot Chat recently allowed attackers to silently steal sensitive data like API keys and private source code. Tracked as CVE-2025-59145 with a critical CVSS score of 9. 6, this vulnerability required no malicious code execution. Instead,…...

gbhackers. com
gbhackers. com > mallory-ai-threat-intelligence-platform > amp

Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action

11+ hour, 25+ min ago  (491+ words) Built by a veteran security team and led by a former Google and Mandiant executive, Mallory delivers intelligence that drives action for enterprise security teams. Mallory is launching a AI-native threat intelligence platform, purpose-built to answer the questions CISOs and…...

gbhackers. com
gbhackers. com > aws-fixes-severe-rce-privilege-escalation-flaws > amp

AWS Fixes Severe RCE, Privilege Escalation Flaws in Research and Engineering Studio

15+ hour, 14+ min ago  (346+ words) AWS recently issued a critical security bulletin addressing severe vulnerabilities in its Research and Engineering Studio (RES). RES is an open-source web portal that allows administrators to create and manage secure cloud-based research environments. Security researchers identified three major flaws…...

gbhackers. com
gbhackers. com > microsoft-details-how-defender-protects-high-value-assets

Microsoft Details How Defender Protects High-Value Assets in Real-World Attacks

1+ day, 10+ hour ago  (366+ words) As cyberattacks become increasingly targeted, hackers are consistently focusing on the core systems that keep enterprise businesses running smoothly. Microsoft security researchers found that more than 78 percent of human-operated attack campaigns successfully compromise a critical asset, such as a domain…...

gbhackers. com
gbhackers. com > palo-alto-cortex-xsoar-flaw-in-microsoft-teams-integration > amp

Palo Alto Cortex XSOAR Flaw in Microsoft Teams Integration Lets Attackers Access Data

1+ day, 14+ hour ago  (441+ words) Palo Alto Networks has released a high-priority security update to address a serious vulnerability in its Cortex XSOAR and Cortex XSIAM platforms. Tracked as CVE-2026-0234, this security flaw exists within the Microsoft Teams integration. If successfully exploited, it allows an…...

gbhackers. com
gbhackers. com > linux-foundation-leader > amp

Linux Foundation Leader Impersonated in Slack Attack on Open Source Developers

1+ day, 12+ hour ago  (530+ words) A social engineering campaign is actively targeting open source developers through Slack. The warning was shared through the Open SSF Siren mailing list, a public threat intelligence platform designed to alert developers and security teams about active threats after initial…...

gbhackers. com
gbhackers. com > comfyui-servers-hijacked

Comfy UI Servers Hijacked for Cryptomining, Proxy Botnet Ops

2+ day, 15+ hour ago  (670+ words) More than 1, 000 Comfy UI servers are currently reachable on the public Internet, even after filtering out honeypots, giving attackers a small but lucrative attack surface concentrated on GPU'rich cloud infrastructure. Once compromised, hosts are folded into two revenue streams: Monero…...

gbhackers. com
gbhackers. com > remus-infostealer-debuts

Remus Infostealer Debuts With Stealthy New Credential-Theft Tactics

2+ day, 12+ hour ago  (717+ words) Hackers are rolling out a new 64bit infostealer dubbed'Remus. The code strongly suggests it is a direct successor to the notorious Lumma Stealer, arriving just months after lawenforcement disruption and public doxxing of Lumma's core operators in 2025. Remus is a 64bit information…...

gbhackers. com
gbhackers. com > eviltokens-uses-microsoft-365

Evil Tokens Uses Stolen Microsoft 365 Tokens, AI to Supercharge BEC

2+ day, 6+ hour ago  (839+ words) Evil Tokens is a new Phishing-as-a-Service (Phaa S) platform that turns stolen Microsoft 365 tokens and AI into an end'to'end factory for Business Email Compromise (BEC) at scale. By combining device-code phishing, custom tooling, and large language models, it enables low- to…...

gbhackers. com
gbhackers. com > fiber-optic-cables-spy-on-private-conversations

Fiber Optic Cables Turned Into Hidden Microphones to Spy on Private Conversations

2+ day, 14+ hour ago  (534+ words) Internet users worldwide rely on fiber optic cables for blazing-fast and secure web connections. However, a groundbreaking discovery reveals that these very cables can be turned into covert listening devices. In a newly published 2026 cybersecurity research paper, experts demonstrated how…...