Category: GBHackers

KeyPlug Malware Server Leak Exposes Fortinet Firewall and VPN Exploitation Tools
18
Apr
2025

KeyPlug Malware Server Leak Exposes Fortinet Firewall and VPN Exploitation Tools

Cybersecurity researchers have stumbled upon a treasure trove of operational tools and scripts linked to the KeyPlug malware, associated with…

Gain Legends International Suffers Security Breach
18
Apr
2025

Gain Legends International Suffers Security Breach

Gain Legends International, a prominent name in sports, entertainment, and venue management, has confirmed a significant cybersecurity breach that has…

Critical AnythingLLM Vulnerability Exposes Systems to Remote Code Execution
18
Apr
2025

Critical AnythingLLM Vulnerability Exposes Systems to Remote Code Execution

A critical security flaw (CVE-2024-13059) in the open-source AI framework AnythingLLM has raised alarms across cybersecurity communities. The vulnerability, discovered in February…

State Sponsored Hackers now Widely Using ClickFix Attack Technique in Espionage Campaigns
18
Apr
2025

State Sponsored Hackers now Widely Using ClickFix Attack Technique in Espionage Campaigns

The state-sponsored hackers from North Korea, Iran, and Russia have begunp deploying the ClickFix social engineering technique, traditionally associated with…

U.S DOGE Allegedly Breached - Whistleblower Leaked Most Sensitive Documents
18
Apr
2025

U.S DOGE Allegedly Breached – Whistleblower Leaked Most Sensitive Documents

A federal whistleblower has accused the Department of Government Efficiency (DOGE) of orchestrating a major cybersecurity breach at the National…

How to Conduct a Cloud Security Assessment
18
Apr
2025

How to Conduct a Cloud Security Assessment

Cloud adoption has transformed organizations’ operations but introduces complex security challenges that demand proactive leadership and a thorough Cloud Security…

Building a Security-First Culture - Advice from Industry CISOs
18
Apr
2025

Building a Security-First Culture – Advice from Industry CISOs

In today’s threat landscape, cybersecurity is no longer confined to firewalls and encryption it’s a cultural imperative. Chief Information Security…

Microsoft Prevents Billions of Dollars in Fraud and Scams
18
Apr
2025

Microsoft Prevents Billions of Dollars in Fraud and Scams

Microsoft has reported significant strides in thwarting financial fraud across its ecosystem. From April 2024 to April 2025, the tech…

Bubble.io 0-Day Flaw Lets Attackers Run Arbitrary Queries on Elasticsearch
18
Apr
2025

Bubble.io 0-Day Flaw Lets Attackers Run Arbitrary Queries on Elasticsearch

A vulnerability in Bubble.io, a leading no-code development platform, has exposed thousands of applications to data breaches. The flaw allows…

Over 6 Million Chrome Extensions Found Executing Remote Commands
18
Apr
2025

Over 6 Million Chrome Extensions Found Executing Remote Commands

Security researchers have uncovered a network of over 35 Google Chrome extensions—collectively installed on more than 6 million browsers—secretly executing…

LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File
18
Apr
2025

LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File

The Cybereason Global Security Operations Center (GSOC) has shed light on the sophisticated tactics used by the LummaStealer malware to…

43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers
18
Apr
2025

43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers

A comprehensive study by zLabs, the research team at Zimperium, has found that over 43% of the top 100 mobile…