Category: GBHackers

OpenSSL Conference 2025: Just 21 Days Until It Begins - GBHackers Security
16
Sep
2025

OpenSSL Conference 2025: Just 21 Days Until It Begins – GBHackers Security

Newark, New Jersey, United States, September 16th, 2025, CyberNewsWire The OpenSSL Conference 2025 will take place on October 7 – 9 in…

700K Customer Records Accessed by Ex-Employee
16
Sep
2025

700K Customer Records Accessed by Ex-Employee

A major data breach at American First Finance, LLC has exposed sensitive information for nearly 700,000 customers. The breach, which…

CrowdStrike npm Packages Hit by Supply Chain Attack
16
Sep
2025

CrowdStrike npm Packages Hit by Supply Chain Attack

A new supply chain attack has compromised multiple npm packages maintained by the crowdstrike-publisher account, marking a worrying continuation of…

Las Vegas, United States, September 16th, 2025, CyberNewsWire
16
Sep
2025

Las Vegas, United States, September 16th, 2025, CyberNewsWire

Seraphic today announced at Fal.Con 2025 that its Secure Enterprise Browser (SEB) solution is now available for purchase in the…

APT28 Exploits Signal Messenger to Deploy eardShell and Covenant Malware
16
Sep
2025

APT28 Exploits Signal Messenger to Deploy eardShell and Covenant Malware

Sekoia.io’s Threat Detection and Response (TDR) team has uncovered a sophisticated campaign by APT28 that weaponizes Signal Messenger to deploy…

LG WebOS TV Vulnerability Enables Full Device Takeover by Bypassing Authentication
16
Sep
2025

LG WebOS TV Vulnerability Enables Full Device Takeover by Bypassing Authentication

A security vulnerability has been discovered in LG WebOS TV systems that allows attackers to gain complete control over affected…

Windows Users Hit by VenomRAT in AI-Driven RevengeHotels Attack
16
Sep
2025

Windows Users Hit by VenomRAT in AI-Driven RevengeHotels Attack

RevengeHotels, also known as TA558, has escalated its long-standing cybercrime campaign by incorporating artificial intelligence into its infection chains, deploying…

The Hidden Risks of Backdoor Injections
16
Sep
2025

The Hidden Risks of Backdoor Injections

AI code assistants integrated into IDEs, like GitHub Copilot, offer powerful chat, auto-completion, and test-generation features. However, threat actors and…

New Persistence Technique Attackers Use to Hide in AWS Cloud Environments
16
Sep
2025

New Persistence Technique Attackers Use to Hide in AWS Cloud Environments

As more companies move their critical systems and data to Amazon Web Services (AWS), attackers are finding new ways to…

WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login
16
Sep
2025

WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login

A critical vulnerability in the Case Theme User plugin for WordPress allows unauthenticated attackers to hijack any account on vulnerable…

Threat Actors Exploit MCP Servers to Steal Sensitive Data
16
Sep
2025

Threat Actors Exploit MCP Servers to Steal Sensitive Data

Unvetted Model Context Protocol (MCP) servers introduce a stealthy supply chain attack vector, enabling adversaries to harvest credentials, configuration files,…

Spring Framework Security Flaws Allow Authorization Bypass and Annotation Detection Issues
16
Sep
2025

Spring Framework Security Flaws Allow Authorization Bypass and Annotation Detection Issues

A pair of medium-severity vulnerabilities in the Spring Framework and Spring Security libraries were disclosed on September 15, 2025. Both…