Category: GBHackers

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access
23
Apr
2025

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Researchers have exposed a sophisticated cyberattack technique dubbed the “Cookie-Bite Attack,” which allows adversaries to bypass Multi-Factor Authentication (MFA) and…

Synology Network File System Vulnerability Allows Unauthorized File Access
23
Apr
2025

Synology Network File System Vulnerability Allows Unauthorized File Access

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021, has been resolved after allowing unauthorized…

Super-Smart AI Could Launch Attacks Sooner Than We Think
23
Apr
2025

Super-Smart AI Could Launch Attacks Sooner Than We Think

In a development for cybersecurity, large language models (LLMs) are being weaponized by malicious actors to orchestrate sophisticated attacks at…

CrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection
23
Apr
2025

CrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection

CrowdStrike today announced the general availability of Falcon® Privileged Access, a breakthrough module in its Falcon® Identity Protection suite, aimed…

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders
23
Apr
2025

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders

Leading British retailer Marks & Spencer Group plc (M&S) has confirmed it has been grappling with a cyberattack over the…

Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges
23
Apr
2025

Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges

Research disclosed a now-patched high-severity vulnerability in Google Cloud Platform’s (GCP) Cloud Composer service, dubbed ConfusedComposer. It could have allowed attackers…

Moodle Core vulnerabilities Allow Attackers to Evade Security Measures
23
Apr
2025

Moodle Core vulnerabilities Allow Attackers to Evade Security Measures

A recent security audit has uncovered critical vulnerabilities within Moodle, the widely used open-source learning management system (LMS). These vulnerabilities…

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With no expiration!
22
Apr
2025

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With no expiration!

A glaring vulnerability has come to light within Samsung’s One UI interface: the clipboard history function stores all copied text,…

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index
22
Apr
2025

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro’s Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that timely patching plays in reducing an…

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft
22
Apr
2025

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on the Python Package Index (PyPI)…

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans
22
Apr
2025

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure named “Cloudflare tunnel infrastructure to…

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs
22
Apr
2025

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge devices playing a critical role…