Category: GBHackers

7 Best Third-Party Risk Management Software in 2025
25
Apr
2025

7 Best Third-Party Risk Management Software in 2025

Whether you operate a small business or run a large enterprise, you rely on third-party suppliers, merchants or software providers….

25
Apr
2025

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok’s user database, allegedly leaking login information for over 900,000…

Chrome UAF Process Vulnerabilities Actively Exploited
25
Apr
2025

Chrome UAF Process Vulnerabilities Actively Exploited

Security researchers have revealed that two critical use-after-free (UAF) vulnerabilities in Google Chrome’s Browser process were actively exploited in the…

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision
25
Apr
2025

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision

The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks, driven by generative AI (GenAI). By…

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access
25
Apr
2025

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to deploy malicious tools like Ammyy Admin…

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to publish
25
Apr
2025

Microsoft Defender XDR False Positive Leaked Massive 1,700+ Sensitive Documents to publish

An alarming data leak involving Microsoft Defender XDR has exposed more than 1,700 sensitive documents from hundreds of organizations, following…

A New Toolkit Bypasses Microsoft Office 365 MFA Security
25
Apr
2025

A New Toolkit Bypasses Microsoft Office 365 MFA Security

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

159 CVEs Exploited in the Wild in Q1 2025, 8.3% Targeted Within 1-Day vulnerabilities Exploited
25
Apr
2025

159 CVEs Exploited in the Wild in Q1 2025, 8.3% Targeted Within 1-Day vulnerabilities Exploited

VulnCheck’s latest report for Q1 2025 has identified 159 Common Vulnerabilities and Exposures (CVEs) publicly disclosed as exploited in the…

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations
25
Apr
2025

Russian VPS Servers With RDP and Proxy Servers Enable North Korean Cybercrime Operations

Trend Research has uncovered a sophisticated network of cybercrime operations linked to North Korea, heavily utilizing Russian internet infrastructure. Specifically,…

Spring Security Vulnerability Exposes Valid Usernames to Attackers
25
Apr
2025

Spring Security Vulnerability Exposes Valid Usernames to Attackers

A newly identified security vulnerability, CVE-2025-22234, has exposed a critical weakness in the widely-used Spring Security framework. According to the…

Microsoft's Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw
25
Apr
2025

Microsoft’s Patch for Symlink Vulnerability Introduces New Windows Denial-of-Service Flaw

Microsoft’s recent attempt to resolve a critical privilege escalation vulnerability has inadvertently introduced a new denial-of-service (DoS) flaw in Windows…

U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers
25
Apr
2025

U.S. Secret Service Reveals Ways to Identify Credit Card Skimmers

With credit card skimming crimes escalating nationwide, the U.S. Secret Service’s Washington Field Office is sharing essential tips for the…