Category: GBHackers

Devices Exploited for Instant DDoS Attacks
03
Sep
2025

Devices Exploited for Instant DDoS Attacks

A newly uncovered variant of the notorious RapperBot malware is covertly commandeering internet-connected devices—particularly outdated network video recorders (NVRs)—and transforming…

Cloudflare Confirms Data Breach – Customer Data Exposed via Salesforce Attack
03
Sep
2025

Cloudflare Confirms Data Breach – Customer Data Exposed via Salesforce Attack

Cloudflare has disclosed a significant data breach affecting customer information following a sophisticated supply chain attack targeting its Salesforce integration…

Top 10 Best API Penetration Testing Companies In 2025
03
Sep
2025

Top 10 Best API Penetration Testing Companies In 2025

Best API Penetration Testing Companies Securing APIs is a critical cybersecurity challenge in 2025 as they are the backbone of…

Threat Hunting Guide Designed for SOC Analysts and MSSPs
02
Sep
2025

Threat Hunting Guide Designed for SOC Analysts and MSSPs

Proactive threat hunting has become an essential discipline for Security Operations Center (SOC) analysts and Managed Security Service Providers (MSSPs)….

Mapping the Web of Commercial Spyware: Targets and Attack Chains
02
Sep
2025

Mapping the Web of Commercial Spyware: Targets and Attack Chains

A comprehensive new report spanning 2010 to 2025 reveals the ever-evolving landscape of commercial spyware vendors (CSVs), exposing the methods…

OneDrive Phishing Attack Targets Corporate Executives for Credential Theft
02
Sep
2025

OneDrive Phishing Attack Targets Corporate Executives for Credential Theft

A newly discovered spearphishing campaign is targeting executives and senior leadership across multiple industries by exploiting trusted OneDrive document‐sharing notifications….

Google Debunks Reports of Major Gmail Security Alert
02
Sep
2025

Google Debunks Reports of Major Gmail Security Alert

Google has firmly rejected widespread reports suggesting it issued a global security alert to its 2.5 billion Gmail users, calling…

ESPHome Vulnerability Allows Unauthorized Access to Smart Devices
02
Sep
2025

ESPHome Vulnerability Allows Unauthorized Access to Smart Devices

A critical authentication bypass flaw in ESPHome’s ESP-IDF web server component allows unauthorized users on the same local network to…

Palo Alto Networks Confirms Data Breach via Compromised Salesforce Instances
02
Sep
2025

Palo Alto Networks Confirms Data Breach via Compromised Salesforce Instances

Cybersecurity vendor Palo Alto Networks disclosed that its Salesforce environment was breached through a compromised Salesloft Drift integration, marking the…

Massive 11.5 Tbps UDP Flood DDoS Attack Originated From Google Cloud
02
Sep
2025

Massive 11.5 Tbps UDP Flood DDoS Attack Originated From Google Cloud

Cloudflare disclosed that its automated defenses intercepted and neutralized a record-shattering Distributed Denial-of-Service (DDoS) assault peaking at 11.5 terabits per…

Iran-Nexus Hackers Exploit Omani Mailbox to Target Governments
02
Sep
2025

Iran-Nexus Hackers Exploit Omani Mailbox to Target Governments

A sophisticated spear-phishing campaign that exploited a compromised mailbox belonging to the Ministry of Foreign Affairs of Oman. The operation,…

Prompt Injection Attacks Can Exploit AI-Powered Cybersecurity Tools
02
Sep
2025

Prompt Injection Attacks Can Exploit AI-Powered Cybersecurity Tools

Researchers have demonstrated that advanced prompt injection techniques can turn defensive AI agents into potent vectors for system compromise. The…