Category: GBHackers

How to Conduct a Cloud Security Assessment
18
Apr
2025

How to Conduct a Cloud Security Assessment

Cloud adoption has transformed organizations’ operations but introduces complex security challenges that demand proactive leadership and a thorough Cloud Security…

Building a Security-First Culture - Advice from Industry CISOs
18
Apr
2025

Building a Security-First Culture – Advice from Industry CISOs

In today’s threat landscape, cybersecurity is no longer confined to firewalls and encryption it’s a cultural imperative. Chief Information Security…

Microsoft Prevents Billions of Dollars in Fraud and Scams
18
Apr
2025

Microsoft Prevents Billions of Dollars in Fraud and Scams

Microsoft has reported significant strides in thwarting financial fraud across its ecosystem. From April 2024 to April 2025, the tech…

Bubble.io 0-Day Flaw Lets Attackers Run Arbitrary Queries on Elasticsearch
18
Apr
2025

Bubble.io 0-Day Flaw Lets Attackers Run Arbitrary Queries on Elasticsearch

A vulnerability in Bubble.io, a leading no-code development platform, has exposed thousands of applications to data breaches. The flaw allows…

Over 6 Million Chrome Extensions Found Executing Remote Commands
18
Apr
2025

Over 6 Million Chrome Extensions Found Executing Remote Commands

Security researchers have uncovered a network of over 35 Google Chrome extensions—collectively installed on more than 6 million browsers—secretly executing…

LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File
18
Apr
2025

LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File

The Cybereason Global Security Operations Center (GSOC) has shed light on the sophisticated tactics used by the LummaStealer malware to…

43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers
18
Apr
2025

43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers

A comprehensive study by zLabs, the research team at Zimperium, has found that over 43% of the top 100 mobile…

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024
18
Apr
2025

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in the number of vulnerabilities detected within…

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis
17
Apr
2025

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as “Cascading Shadows” to deliver various malware,…

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations
17
Apr
2025

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat, particularly targeting Taiwanese organizations. The group,…

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector
17
Apr
2025

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend for global businesses. According to a…

3 Security Decisions That Could Make or Break Your Career This Year
17
Apr
2025

3 Security Decisions That Could Make or Break Your Career This Year

In today’s rapidly evolving digital landscape, security has transcended from being a technical concern to a strategic leadership imperative. As…