Category: GBHackers

Russian Company Gains Full Control Over Critical Open Source Easyjson Library
07
May
2025

Russian Company Gains Full Control Over Critical Open Source Easyjson Library

A startling discovery by Hunted Labs has brought to light a potential security risk lurking within the heart of the…

CISA Warns of Cyber Threats to Oil and Gas SCADA and ICS Networks
07
May
2025

CISA Warns of Cyber Threats to Oil and Gas SCADA and ICS Networks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert warning critical infrastructure operators-particularly those in the oil…

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER
07
May
2025

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its attacks in the first quarter of…

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed
07
May
2025

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector emerged as a prime target for…

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks
07
May
2025

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6 million phished data records recaptured from…

Healthcare Sector Becomes a Major Target for Cyber Attacks in 2025
07
May
2025

Healthcare Sector Becomes a Major Target for Cyber Attacks in 2025

The healthcare sector has emerged as a prime target for cyber attackers, driven by the increasing reliance on cloud applications…

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability
07
May
2025

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect servers vulnerable to the recently disclosed…

SysAid ITSM Vulnerabilities Enables Pre-Auth Remote Command Execution
07
May
2025

SysAid ITSM Vulnerabilities Enables Pre-Auth Remote Command Execution

Security researchers have disclosed a chain of critical vulnerabilities affecting SysAid ITSM’s On-Premise solution, enabling unauthenticated attackers to execute remote…

Researchers Simulate DPRK's Largest Cryptocurrency Heist Through Compromised macOS Developer and AWS Pivoting
07
May
2025

Researchers Simulate DPRK’s Largest Cryptocurrency Heist Through Compromised macOS Developer and AWS Pivoting

Security researchers at Elastic have recreated the intricate details of the February 21, 2025, ByBit cryptocurrency heist, where approximately 400,000…

Lampion Banking Malware Uses ClickFix Lures to Steal Banking Credentials
07
May
2025

Lampion Banking Malware Uses ClickFix Lures to Steal Banking Credentials

Unit 42 researchers at Palo Alto Networks, a highly targeted malicious campaign orchestrated by the threat actors behind the Lampion…

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code
07
May
2025

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads
07
May
2025

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its Cognos Analytics platform. These flaws, tracked…