Category: GBHackers

PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access
08
Sep
2025

PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access

A newly disclosed security flaw in pgAdmin4, the widely used open-source tool for managing PostgreSQL databases, has raised serious concerns among…

How Microsoft Azure Storage Logs Help Investigate Security Breaches
08
Sep
2025

How Microsoft Azure Storage Logs Help Investigate Security Breaches

When a security breach occurs, vital evidence often appears in unexpected places. One such source is Microsoft Azure Storage logs, which…

U.S. Officials Investigating Cyber Threat Aimed at China Trade Talks
08
Sep
2025

U.S. Officials Investigating Cyber Threat Aimed at China Trade Talks

According to the Wall Street Journal, the deceptive message, purporting to come from Representative John Moolenaar, was dispatched in July…

Atomic Stealer Hidden in Pirated Software
08
Sep
2025

Atomic Stealer Hidden in Pirated Software

The cybersecurity landscape for macOS users has taken a dangerous turn as cybercriminals increasingly target Apple’s ecosystem with sophisticated malware…

Australian Authorities Expose Ransomware Gangs and Their Hidden Careers
08
Sep
2025

Australian Authorities Expose Ransomware Gangs and Their Hidden Careers

Groundbreaking research reveals the inner workings of cybercriminal networks targeting Australia and allied nations. Australian researchers have completed a comprehensive…

Tenable Data Breach Confirmed -Customer Contact Details Compromised
08
Sep
2025

Tenable Data Breach Confirmed -Customer Contact Details Compromised

Tenable, a well-known cybersecurity company, has confirmed that it was affected by a recent large-scale data theft campaign. The attack…

Hackers Exploit Fake Microsoft Teams Site to Spread Odyssey macOS Stealer
08
Sep
2025

Hackers Exploit Fake Microsoft Teams Site to Spread Odyssey macOS Stealer

Cybercriminals have escalated their attacks against macOS users by deploying a sophisticated new campaign that leverages a fraudulent Microsoft Teams…

New GhostAction Attack Compromises 327 GitHub Users and 817 Repositories
08
Sep
2025

New GhostAction Attack Compromises 327 GitHub Users and 817 Repositories

Security researchers uncovered a large-scale attack campaign now identified as GhostAction, which compromised secrets belonging to 327 GitHub users and impacted 817 repositories. The…

Wealthsimple Data Breach - User Information Leaked Online
08
Sep
2025

Wealthsimple Data Breach – User Information Leaked Online

Canadian financial technology company Wealthsimple disclosed a data security incident on September 5, 2025, revealing that personal information belonging to…

Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks
06
Sep
2025

Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks

The year 2025 has unfolded in an environment marked by eroding trust in vulnerability databases, an explosive growth in cyberattacks,…

CISA Issues Alert on Android 0-Day Use-After-Free Vulnerability Under Active Exploitation
05
Sep
2025

CISA Issues Alert on Android 0-Day Use-After-Free Vulnerability Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert for a newly discovered zero-day vulnerability in the…

Over 143,000 Malware Files Target Android and iOS Users in Q2 2025
05
Sep
2025

Over 143,000 Malware Files Target Android and iOS Users in Q2 2025

In the second quarter of 2025, users of Android and iOS devices faced relentless cyberthreats, with Kaspersky Security Network reporting…