Category: GBHackers

Microsoft Alerts on Void Blizzard Hackers Targeting Telecommunications and IT Sectors
27
May
2025

Microsoft Alerts on Void Blizzard Hackers Targeting Telecommunications and IT Sectors

Microsoft Threat Intelligence Center (MSTIC) has issued a critical warning about a cluster of global cloud abuse activities orchestrated by…

Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data
27
May
2025

Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data

DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95% of Fortune 500 companies, and boasts…

Government Calls on Organizations to Adopt SIEM and SOAR Solutions
27
May
2025

Government Calls on Organizations to Adopt SIEM and SOAR Solutions

In a landmark initiative, international cybersecurity agencies have released a comprehensive series of publications to guide organizations through the implementation…

WordPress TI WooCommerce Wishlist Plugin Flaw Puts Over 100,000 Websites at Risk of Cyberattack
27
May
2025

WordPress TI WooCommerce Wishlist Plugin Flaw Puts Over 100,000 Websites at Risk of Cyberattack

A severe security flaw has been identified in the TI WooCommerce Wishlist plugin, a widely used WordPress extension with over…

APT36 and Sidecopy Hackers Target India’s Critical Infrastructure with Malware Attacks
27
May
2025

APT36 and Sidecopy Hackers Target India’s Critical Infrastructure with Malware Attacks

Seqrite Labs, India’s largest malware analysis facility, has uncovered a sophisticated campaign dubbed Operation Sindoor, orchestrated by Pakistan-aligned threat groups…

Iranian Cybergroup Toufan Targets Organizations to Steal Login Credentials
27
May
2025

Iranian Cybergroup Toufan Targets Organizations to Steal Login Credentials

A pro-Palestinian cybergroup called Cyber Toufan, which means “cyber storm,” has become a serious threat to Israeli groups in the…

Mozilla Quickly Fixes Firefox Vulnerabilities from Pwn2Own 2025 with Urgent Patches
27
May
2025

Mozilla Quickly Fixes Firefox Vulnerabilities from Pwn2Own 2025 with Urgent Patches

At this year’s Pwn2Own Berlin, security researchers successfully demonstrated two new zero-day exploits against Mozilla Firefox, targeting the browser’s content…

Adidas Customer Information Compromised Through Third-Party Vendor
27
May
2025

Adidas Customer Information Compromised Through Third-Party Vendor

German sportswear giant Adidas has confirmed a data breach after cybercriminals accessed customer data through a third-party customer service provider….

Multiple Vulnerabilities in Hardy Barth EV Station Allow Unauthenticated Network Access
27
May
2025

Multiple Vulnerabilities in Hardy Barth EV Station Allow Unauthenticated Network Access

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Red Hat and AMD Team Up to Boost AI Processing Power and Performance
27
May
2025

Red Hat and AMD Team Up to Boost AI Processing Power and Performance

Red Hat, Inc., the global leader in open source solutions, has announced a strategic collaboration with AMD, a pioneer in…

New Android Malware GhostSpy Grants Attackers Full Control Over Infected Devices
27
May
2025

New Android Malware GhostSpy Grants Attackers Full Control Over Infected Devices

A chilling new Android malware, dubbed GhostSpy, has emerged as a significant threat to mobile security, according to a detailed…

Arm Mali GPU Vulnerability Enables Bypass of MTE and Arbitrary Kernel Code Execution
27
May
2025

Arm Mali GPU Vulnerability Enables Bypass of MTE and Arbitrary Kernel Code Execution

A critical vulnerability, identified as CVE-2025-0072, has been discovered in the Arm Mali GPU driver, posing a significant threat to…