Category: GBHackers

Promptware Kill Chain - Five-step Kill Chain Model For Analyzing Cyberthreats
15
Jan
2026

Promptware Kill Chain – Five-step Kill Chain Model For Analyzing Cyberthreats

Promptware Kill Chain is a new five-step model that explains how attacks against AI systems powered by large language models…

GoLogin vs MultiLogin vs VMLogin - What's the Anti-Detect Browsers Difference? - GBHackers Security
15
Jan
2026

GoLogin vs MultiLogin vs VMLogin – What’s the Anti-Detect Browsers Difference? – GBHackers Security

A web browser is a door to the Global Network, allows to surf through different resources, obtain all required information,…

Open-Source Misconfiguration Detection for Salesforce Aura
15
Jan
2026

Open-Source Misconfiguration Detection for Salesforce Aura

Mandiant has released AuraInspector, an open-source command-line tool designed to help security teams identify and audit access control misconfigurations within…

Multiple Elastic Vulnerabilities Could Lead to File Theft and DoS
15
Jan
2026

Multiple Elastic Vulnerabilities Could Lead to File Theft and DoS

Elastic has released urgent security patches addressing four significant vulnerabilities in Kibana that could enable attackers to steal sensitive files,…

Spring CLI Vulnerability Allows Attackers to Execute Commands on User Systems
14
Jan
2026

Spring CLI Vulnerability Allows Attackers to Execute Commands on User Systems

A command-injection vulnerability in the Spring CLI VSCode extension allows attackers to execute arbitrary commands on affected user machines.   The vulnerability, tracked as CVE-2026-22718, affects all…

Android Users Hit by Volume Button Bug Linked to Select to Speak
14
Jan
2026

Android Users Hit by Volume Button Bug Linked to Select to Speak

Google has confirmed a critical bug affecting Android devices where volume buttons malfunction when the Select to Speak accessibility feature…

Betterment Confirms Unauthorized Access to Its Internal Systems
14
Jan
2026

Betterment Confirms Unauthorized Access to Its Internal Systems

Digital investment advisor Betterment has confirmed that unauthorized individuals gained access to its internal systems in a recent security breach.  …

North Korean Hackers Exploit Code Repositories in “Contagious Interview” Campaign
14
Jan
2026

North Korean Hackers Exploit Code Repositories in “Contagious Interview” Campaign

A newly documented campaign dubbed “Contagious Interview” shows North Korean threat actors weaponising developer tooling and code-repository workflows to steal…

DragonForce Ransomware Breakdown and Decryptor for ESXi & Windows
14
Jan
2026

DragonForce Ransomware Breakdown and Decryptor for ESXi & Windows

Security researchers have published an in‑depth technical analysis of the DragonForce ransomware operation, along with details of working decryptors for…

GitGuardian Ends 2025 with Strong Enterprise Momentum
14
Jan
2026

GitGuardian Ends 2025 with Strong Enterprise Momentum

New York, NY, January 14th, 2026, CyberNewsWire Leading secrets security platform sees accelerated adoption across Fortune 500, with 60% of…

SpyCloud Launches Supply Chain Identity Protection
14
Jan
2026

SpyCloud Launches Supply Chain Identity Protection

Austin, TX / USA, January 14th, 2026, CyberNewsWire New monitoring capability delivers unprecedented visibility into vendor identity exposures, moving enterprises…

2026 Panorays Study: CISOs Lack Third-Party Visibility
14
Jan
2026

2026 Panorays Study: CISOs Lack Third-Party Visibility

New York, NY, January 14th, 2026, CyberNewsWire Panorays, a leading provider of third-party security risk management software, has released the…