Category: GBHackers

Hackers Exploit Amazon SES to Blast Over 50,000 Malicious Emails Daily
08
Sep
2025

Hackers Exploit Amazon SES to Blast Over 50,000 Malicious Emails Daily

A sophisticated cyberattack campaign where threat actors exploited compromised AWS credentials to hijack Amazon’s Simple Email Service (SES), launching large-scale…

Web Application Firewall Bypassed via JS Injection with Parameter Pollution
08
Sep
2025

Web Application Firewall Bypassed via JS Injection with Parameter Pollution

In a recent autonomous penetration test, a novel cross-site scripting (XSS) bypass that sidesteps even highly restrictive Web Application Firewalls…

PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access
08
Sep
2025

PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access

A newly disclosed security flaw in pgAdmin4, the widely used open-source tool for managing PostgreSQL databases, has raised serious concerns among…

How Microsoft Azure Storage Logs Help Investigate Security Breaches
08
Sep
2025

How Microsoft Azure Storage Logs Help Investigate Security Breaches

When a security breach occurs, vital evidence often appears in unexpected places. One such source is Microsoft Azure Storage logs, which…

U.S. Officials Investigating Cyber Threat Aimed at China Trade Talks
08
Sep
2025

U.S. Officials Investigating Cyber Threat Aimed at China Trade Talks

According to the Wall Street Journal, the deceptive message, purporting to come from Representative John Moolenaar, was dispatched in July…

Atomic Stealer Hidden in Pirated Software
08
Sep
2025

Atomic Stealer Hidden in Pirated Software

The cybersecurity landscape for macOS users has taken a dangerous turn as cybercriminals increasingly target Apple’s ecosystem with sophisticated malware…

Australian Authorities Expose Ransomware Gangs and Their Hidden Careers
08
Sep
2025

Australian Authorities Expose Ransomware Gangs and Their Hidden Careers

Groundbreaking research reveals the inner workings of cybercriminal networks targeting Australia and allied nations. Australian researchers have completed a comprehensive…

Tenable Data Breach Confirmed -Customer Contact Details Compromised
08
Sep
2025

Tenable Data Breach Confirmed -Customer Contact Details Compromised

Tenable, a well-known cybersecurity company, has confirmed that it was affected by a recent large-scale data theft campaign. The attack…

Hackers Exploit Fake Microsoft Teams Site to Spread Odyssey macOS Stealer
08
Sep
2025

Hackers Exploit Fake Microsoft Teams Site to Spread Odyssey macOS Stealer

Cybercriminals have escalated their attacks against macOS users by deploying a sophisticated new campaign that leverages a fraudulent Microsoft Teams…

New GhostAction Attack Compromises 327 GitHub Users and 817 Repositories
08
Sep
2025

New GhostAction Attack Compromises 327 GitHub Users and 817 Repositories

Security researchers uncovered a large-scale attack campaign now identified as GhostAction, which compromised secrets belonging to 327 GitHub users and impacted 817 repositories. The…

Wealthsimple Data Breach - User Information Leaked Online
08
Sep
2025

Wealthsimple Data Breach – User Information Leaked Online

Canadian financial technology company Wealthsimple disclosed a data security incident on September 5, 2025, revealing that personal information belonging to…

Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks
06
Sep
2025

Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks

The year 2025 has unfolded in an environment marked by eroding trust in vulnerability databases, an explosive growth in cyberattacks,…