GBHackers Security | #1 Globally Trusted Cyber Security News Platform GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates.
- 1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detectionby Kavichselvan on October 27, 2025 at 2:52 pm
London, United Kingdom, October 27th, 2025, CyberNewsWire 1inch, the leading DeFi ecosystem, has adopted Innerworks’ advanced device intelligence and RedTeam ethical hacking platform to strengthen security. By tapping into Innerworks’ predictive AI solution, the companies are building a proactive immune system and setting the gold standard for DeFi. DeFi’s growth and evolution has led to The post 1inch partners with Innerworks to strengthen DeFi security through AI-Powered threat detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
- Hackers Target 81% of Routers with Default Admin Passwordsby Mayura Kathir on October 27, 2025 at 2:37 pm
The latest 2025 Broadband Genie router security survey reveals alarming trends in network security awareness among internet users. This year’s results, while showing marginal improvements in some areas, underscore the persistent gap between knowing how to secure a network and actually taking action. The research team conducted their fourth comprehensive router security survey to compare The post Hackers Target 81% of Routers with Default Admin Passwords appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
- Critical Chrome 0-Day Under Attack: Mem3nt0 Mori Hackers Actively Exploiting Vulnerabilityby Mayura Kathir on October 27, 2025 at 1:54 pm
In March 2025, security researchers at Kaspersky detected a sophisticated campaign exploiting a previously unknown Chrome vulnerability to deliver advanced spyware to high-profile targets. The attack, dubbed Operation ForumTroll, leveraged personalized phishing links to compromise organizations across Russia, including media outlets, universities, research centers, government agencies, and financial institutions. A single click on a malicious The post Critical Chrome 0-Day Under Attack: Mem3nt0 Mori Hackers Actively Exploiting Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
- iOS 26 Overwrites ‘shutdown.log’ on Reboot, Erasing Forensic Evidence of Pegasus and Predator Spywareby Mayura Kathir on October 27, 2025 at 1:17 pm
As iOS 26 is being rolled out, a critical forensic challenge has emerged: the operating system now automatically overwrites the shutdown.log file on every reboot, effectively erasing crucial evidence of Pegasus and Predator spyware infections. This development represents a significant setback for forensic investigators and users seeking to determine whether their devices have been compromised—particularly The post iOS 26 Overwrites ‘shutdown.log’ on Reboot, Erasing Forensic Evidence of Pegasus and Predator Spyware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
- New EDR-Redir Tool Bypasses EDRs by Exploiting Bind Filter and Cloud Filter Driverby Divya on October 27, 2025 at 1:05 pm
Cybersecurity researchers have developed a sophisticated new tool called EDR-Redir that can bypass Endpoint Detection and Response (EDR) systems by exploiting Windows’ Bind Filter and Cloud Filter drivers. This technique represents a significant advancement in evasion methods that operate entirely in user mode without requiring kernel privileges. The Windows Bind Link feature, introduced in Windows The post New EDR-Redir Tool Bypasses EDRs by Exploiting Bind Filter and Cloud Filter Driver appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
- Critical HashiCorp Vault Vulnerabilities Allow Authentication Bypass and DoS Attacksby Mayura Kathir on October 27, 2025 at 12:06 pm
HashiCorp has disclosed two critical vulnerabilities in Vault and Vault Enterprise that could enable attackers to bypass authentication mechanisms and launch denial-of-service attacks against infrastructure. The first vulnerability, identified under Bulletin ID HCSEC-2025-31, stems from a regression in how Vault processes JSON payloads. According to HashiCorp’s disclosure published on October 23, 2025, the vulnerability allows The post Critical HashiCorp Vault Vulnerabilities Allow Authentication Bypass and DoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
- Dell Storage Manager Vulnerabilities Allow Full System Compromiseby Mayura Kathir on October 27, 2025 at 11:20 am
Dell Technologies has disclosed three critical vulnerabilities affecting Dell Storage Manager that could allow unauthenticated remote attackers to completely compromise storage systems. Dell Storage Manager versions prior to 2020 R1.21 are vulnerable to attacks that bypass authentication mechanisms entirely, enabling adversaries to gain full system access without valid credentials. The vulnerabilities, disclosed on October 24, The post Dell Storage Manager Vulnerabilities Allow Full System Compromise appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
- ChatGPT’s Atlas Browser Jailbroken to Hide Malicious Prompts Inside URLsby Divya on October 27, 2025 at 11:08 am
Security researchers at NeuralTrust have uncovered a critical vulnerability in OpenAI’s Atlas browser that allows attackers to bypass safety measures by disguising malicious instructions as innocent-looking web addresses. The flaw exploits how the browser’s omnibox interprets user input, potentially enabling harmful actions without proper security checks. The Omnibox Vulnerability Explained Atlas features an omnibox that The post ChatGPT’s Atlas Browser Jailbroken to Hide Malicious Prompts Inside URLs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
- Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Critical Infrastructureby Mayura Kathir on October 27, 2025 at 10:42 am
A sophisticated cyber-sabotage group known as Predatory Sparrow has emerged as one of the most destructive threat actors targeting Iranian critical infrastructure over the past several years. Unlike traditional cybercriminal operations focused on financial gain, this group executes highly disruptive campaigns designed to cripple essential services, destroy sensitive data, and send provocative political messages. Security The post Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Critical Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
- Qilin Ransomware Exploits MSPaint and Notepad to Locate Sensitive Filesby Mayura Kathir on October 27, 2025 at 8:35 am
In the latter half of 2025, the Qilin ransomware group has solidified its standing as a formidable threat, continuing to post details of more than 40 victims per month on its public leak site. This rapid, relentless campaign—primarily impacting manufacturing, professional and scientific services, and wholesale trade—has propelled Qilin among the world’s most impactful ransomware The post Qilin Ransomware Exploits MSPaint and Notepad to Locate Sensitive Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.













