Category: GBHackers

The Future of Authentication: Moving Beyond Passwords
15
Apr
2025

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their reign is coming to an end….

CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers
15
Apr
2025

CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers

A critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage and collaboration platform, which could allow…

15
Apr
2025

Over 100,000 WordPress Plugin VUlnerability Exploited Just 4 Hours After Disclosure

Over 100,000 WordPress websites have been exposed to a critical security vulnerability, following the public disclosure of a flaw in…

Hackers Use Microsoft Teams Chats to Deliver Malware to Windows PCs
15
Apr
2025

Hackers Use Microsoft Teams Chats to Deliver Malware to Windows PCs

A sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams chats to infiltrate Windows PCs with malware, according to a recent…

Apache Roller Vulnerability Allows Hackers to Bypass Access Controls
15
Apr
2025

Apache Roller Vulnerability Allows Hackers to Bypass Access Controls

A newly disclosed vulnerability in Apache Roller, the popular open-source blog server, could allow attackers to bypass critical access controls…

Galaxy S24 Vulnerability Poses Risk of Unauthorized File Access
15
Apr
2025

Galaxy S24 Vulnerability Poses Risk of Unauthorized File Access

A security flaw in Samsung’s Quick Share feature for the Galaxy S24 series has been disclosed, enabling attackers to create…

Colleges and Schools Now Top Targets for Online Threat Actors
15
Apr
2025

Colleges and Schools Now Top Targets for Online Threat Actors

Across the globe, a new kind of threat is targeting the very institutions dedicated to shaping the future: schools, colleges,…

Cybersecurity for Startups - What Early-Stage CISOs Must Prioritize
15
Apr
2025

Cybersecurity for Startups – What Early-Stage CISOs Must Prioritize

Early-stage startups face unique cybersecurity challenges that established enterprises have already addressed through years of investment and experience. For Chief…

FortiGate 0-Day Exploit Allegedly Up for Sale on Dark Web
14
Apr
2025

FortiGate 0-Day Exploit Allegedly Up for Sale on Dark Web

A chilling new development in the cybersecurity landscape has emerged, as a threat actor has reportedly advertised an alleged zero-day…

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New
14
Apr
2025

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New

VMware has announced that ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor, is now available for download at…

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI
14
Apr
2025

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular file exchange solution. The flaw, designated…

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers
14
Apr
2025

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on leaked documents circulating on social media…