Category: GBHackers

Hackers Compromise WordPress GravityForms Plugin with Malicious Code Injection
12
Jul
2025

Hackers Compromise WordPress GravityForms Plugin with Malicious Code Injection

Hackers have targeted the popular WordPress plugin Gravity Forms, injecting malicious code into versions downloaded from the official gravityforms.com domain….

Hacker Returns $42 Million in Stolen Crypto in Exchange for $5 Million Bounty
12
Jul
2025

Hacker Returns $42 Million in Stolen Crypto in Exchange for $5 Million Bounty

A security flaw in the GMX V1 software was made public, causing a significant upheaval in the decentralized finance (DeFi)…

Microsoft Broadens Zero Trust Training to Address Network and SecOps Domains
12
Jul
2025

Microsoft Broadens Zero Trust Training to Address Network and SecOps Domains

Zero Trust architectures are being adopted by enterprises globally to update their security postures in response to the fast changing…

Iranian APT Hackers Targeting Transportation and Manufacturing Sectors in Active Attacks
11
Jul
2025

Iranian APT Hackers Targeting Transportation and Manufacturing Sectors in Active Attacks

Nozomi Networks Labs cybersecurity researchers have reported a startling 133% increase in cyberattacks linked to well-known Iranian advanced persistent threat…

SLOW#TEMPEST Hackers Adopt New Evasion Tactics to Bypass Detection Systems
11
Jul
2025

SLOW#TEMPEST Hackers Adopt New Evasion Tactics to Bypass Detection Systems

Security researchers have uncovered a sophisticated evolution in the SLOW#TEMPEST malware campaign, where threat actors are deploying innovative obfuscation methods…

Qilin Leads in Exploiting Unpatched Fortinet Vulnerabilities
11
Jul
2025

Qilin Leads in Exploiting Unpatched Fortinet Vulnerabilities

The Qilin group has surged to prominence by aggressively exploiting critical vulnerabilities in Fortinet devices, underscoring a broader trend of…

Arkana Ransomware Gang Claims Theft of 2.2 Million Customer Records
11
Jul
2025

Arkana Ransomware Gang Claims Theft of 2.2 Million Customer Records

The Arkana ransomware group burst onto the cybercrime scene with a high-profile attack on WideOpenWest (WOW!), a prominent U.S. internet…

Mis-scoped AWS Organizations Policy Allowed Hackers to Seize Full Control of AWS Environment
11
Jul
2025

Mis-scoped AWS Organizations Policy Allowed Hackers to Seize Full Control of AWS Environment

Security professionals have uncovered serious vulnerabilities in AWS Organizations in a ground-breaking study by Cymulate Research Labs that might allow…

Infostealers Targeting macOS Users in Active Campaigns to Steal Sensitive Data
11
Jul
2025

Infostealers Targeting macOS Users in Active Campaigns to Steal Sensitive Data

MacOS infostealers are becoming a powerful and underappreciated method of data exfiltration in a world where Windows-centric threats predominate. They…

Microsoft Removes High-Privilege Access to Strengthen Microsoft 365 Security
11
Jul
2025

Microsoft Removes High-Privilege Access to Strengthen Microsoft 365 Security

Microsoft has taken a significant step forward in bolstering the security of its Microsoft 365 ecosystem by systematically eliminating high-privileged…

Rockerbox Data Breach Exposes 245,949 Users' SSNs and Driver’s Licenses
11
Jul
2025

Rockerbox Data Breach Exposes 245,949 Users’ SSNs and Driver’s Licenses

Jeremiah Fowler, an ethical researcher, discovered an unsecured database with 245,949 entries totaling 286.9 GB in a huge cybersecurity issue….

CISA Alerts on Active Exploits Targeting Citrix NetScaler ADC and Gateway Flaw
11
Jul
2025

CISA Alerts on Active Exploits Targeting Citrix NetScaler ADC and Gateway Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding active exploitation of a newly discovered vulnerability…