GTIG

Entity category: organization

Business

CISA Gives Feds 3 Days to Patch Critical Dell Vulnerability

CISA has mandated federal agencies to patch a critical Dell vulnerability within three days, as it is under active exploitation…

Read More »
BigTech Companies

China-Linked Hackers Exploited Dell Zero-Day Since 2024

A China-linked cyberespionage group exploited a critical Dell software vulnerability (CVE-2026-22769) for over a year, using it to implant stealthy…

Read More »
Artificial Intelligence

Google: Hackers Use Gemini AI for Every Attack Phase

State-sponsored hacking groups from China, Iran, North Korea, and Russia are using Google's Gemini AI to conduct reconnaissance, craft phishing…

Read More »
AI & Tech

Nation-State Hackers Now Using Gemini AI in Attacks

Nation-state hacking groups from Iran, China, and North Korea are increasingly using AI tools like Google's Gemini to enhance offensive…

Read More »
BigTech Companies

Google dismantles secret network hijacking phone internet

Google dismantled a major cybercrime operation that hijacked millions of personal devices to create a global proxy network, which hackers…

Read More »
BigTech Companies

Google Shuts Down IPIDEA Proxy Networks Powered by Malware

Google and partners dismantled the IPIDEA residential proxy network, which was secretly routing malicious traffic through millions of compromised devices…

Read More »
BigTech Companies

Google Shuts Down Major Residential Proxy Networks

Google dismantled the IPIDEA residential proxy network, a major tool for cybercriminals to hide malicious traffic by routing it through…

Read More »
BigTech Companies

Google Takes Down Proxy Network Used by 550+ Hacker Groups

Google dismantled the Ipidea residential proxy network, which was used by over 550 hacker groups to hide attacks by routing…

Read More »
BigTech Companies

WinRAR Path Flaw Still Actively Exploited by Hackers

A critical path traversal vulnerability (CVE-2025-8088) in WinRAR allows attackers to hide malicious files in archives and place them in…

Read More »
Artificial Intelligence

10 AI Risks That Could Devastate 2026

The cybersecurity landscape in 2026 will be defined by the weaponization of AI, leading to faster, more adaptive, and harder-to-detect…

Read More »
BigTech Companies

Triofox Hack: Critical File-Sharing Flaw Exploited

A critical security vulnerability (CVE-2025-12480) in Gladinet's Triofox platform allows attackers to execute malicious code by exploiting improper access control…

Read More »
AI & Tech

Google AI Detects Malware That Morphs During Attacks

Google has identified a new generation of AI-powered malware that rewrites its own code during attacks, making it more resilient…

Read More »
AI & Tech

Google: AI-Powered Malware Is Now in Active Use

Google has identified new AI-driven malware families like PromptFlux and PromptSteal that use large language models to dynamically generate malicious…

Read More »
AI & Tech

Google Warns of New AI-Powered Malware Threat

Google has identified a new generation of AI-powered malware, such as PromptFlux and PromptSteal, that dynamically rewrites its own code…

Read More »
BigTech Companies

Google: Microsoft WSUS Attacks Strike Multiple Organizations

A critical remote code execution vulnerability (CVE-2025-59287) in Microsoft's WSUS is being actively exploited, affecting Windows Server versions from 2012…

Read More »
BigTech Companies

Russian Hackers Hide Malware in CAPTCHA Tests

Star Blizzard, a Russian state-sponsored hacking group, has escalated cyber-espionage by hiding malware like NoRobot, YesRobot, and MaybeRobot within fake…

Read More »
Cybersecurity

North Korean Hackers’ New EtherHiding Crypto Heist

A North Korean hacking group is using EtherHiding, a blockchain-based method that embeds malware in smart contracts, making the blockchain…

Read More »
Cybersecurity

North Korean Hackers Hide Malware on Blockchain

EtherHiding is a technique used by North Korean hackers to hide malware on public blockchains, making it hard for authorities…

Read More »
BigTech Companies

Google: Clop Hackers Stole Major Data in Oracle Breach

The Clop ransomware group breached Oracle's E-Business Suite starting around August 9, exploiting a zero-day vulnerability (CVE-2025-61882) to steal corporate…

Read More »
BigTech Companies

Clop Ransomware Group Claims Oracle Data Theft in New Extortion Emails

A sophisticated extortion campaign is targeting corporate executives with emails alleging data theft from Oracle E-Business Suite systems, tracked by…

Read More »