Category: GBHackers

Iranian Cybergroup Toufan Targets Organizations to Steal Login Credentials
27
May
2025

Iranian Cybergroup Toufan Targets Organizations to Steal Login Credentials

A pro-Palestinian cybergroup called Cyber Toufan, which means “cyber storm,” has become a serious threat to Israeli groups in the…

Mozilla Quickly Fixes Firefox Vulnerabilities from Pwn2Own 2025 with Urgent Patches
27
May
2025

Mozilla Quickly Fixes Firefox Vulnerabilities from Pwn2Own 2025 with Urgent Patches

At this year’s Pwn2Own Berlin, security researchers successfully demonstrated two new zero-day exploits against Mozilla Firefox, targeting the browser’s content…

Adidas Customer Information Compromised Through Third-Party Vendor
27
May
2025

Adidas Customer Information Compromised Through Third-Party Vendor

German sportswear giant Adidas has confirmed a data breach after cybercriminals accessed customer data through a third-party customer service provider….

Multiple Vulnerabilities in Hardy Barth EV Station Allow Unauthenticated Network Access
27
May
2025

Multiple Vulnerabilities in Hardy Barth EV Station Allow Unauthenticated Network Access

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…

Red Hat and AMD Team Up to Boost AI Processing Power and Performance
27
May
2025

Red Hat and AMD Team Up to Boost AI Processing Power and Performance

Red Hat, Inc., the global leader in open source solutions, has announced a strategic collaboration with AMD, a pioneer in…

New Android Malware GhostSpy Grants Attackers Full Control Over Infected Devices
27
May
2025

New Android Malware GhostSpy Grants Attackers Full Control Over Infected Devices

A chilling new Android malware, dubbed GhostSpy, has emerged as a significant threat to mobile security, according to a detailed…

Arm Mali GPU Vulnerability Enables Bypass of MTE and Arbitrary Kernel Code Execution
27
May
2025

Arm Mali GPU Vulnerability Enables Bypass of MTE and Arbitrary Kernel Code Execution

A critical vulnerability, identified as CVE-2025-0072, has been discovered in the Arm Mali GPU driver, posing a significant threat to…

Hackers Exploit HTTP/2 Flaw to Launch Arbitrary Cross-Site Scripting Attacks
27
May
2025

Hackers Exploit HTTP/2 Flaw to Launch Arbitrary Cross-Site Scripting Attacks

A groundbreaking study from Tsinghua University and Zhongguancun Laboratory has uncovered critical vulnerabilities in modern web infrastructure, revealing that HTTP/2…

How Google Meet Pages Are Exploited to Deliver PowerShell Malware
27
May
2025

How Google Meet Pages Are Exploited to Deliver PowerShell Malware

A new wave of cyberattacks exploits user trust in Google Meet by deploying meticulously crafted fake meeting pages that trick…

Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data
27
May
2025

Threat Actors Deploy Database Client Tools on Targeted Systems to Exfiltrate Sensitive Data

Cybersecurity experts have noted an increase in data breaches where threat actors are directly querying internal databases to steal sensitive…

Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials
27
May
2025

Katz Stealer Targets Chrome, Edge, Brave, and Firefox to Steal Login Credentials

Katz Stealer has emerged as a potent credential-stealing malware-as-a-service, targeting popular web browsers such as Chrome, Edge, Brave, and Firefox….

Fake DigiYatra Apps Target Indian Users to Steal Financial Data
27
May
2025

Fake DigiYatra Apps Target Indian Users to Steal Financial Data

Threat actors have been exploiting the trust in India’s digital public infrastructure by setting up a deceptive phishing site, digiyatra[.]in,…