Category: GBHackers

What Is Public Cloud vs. Private Cloud? Pros and Cons Explained 
15
Jan
2025

What Is Public Cloud vs. Private Cloud? Pros and Cons Explained 

Are you trying to decide between public and private cloud solutions for your business? It’s not always easy to figure…

Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability
14
Jan
2025

Hackers Attacking Internet Connected Fortinet Firewalls Using Zero-Day Vulnerability

A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the public internet. The attacks, observed by…

Google's "Sign in with Google" Flaw Exposes Millions of Users' Details
14
Jan
2025

Google’s “Sign in with Google” Flaw Exposes Millions of Users’ Details

A critical flaw in Google’s “Sign in with Google” authentication system has left millions of Americans vulnerable to potential data…

Critical macOS Vulnerability Lets Hackers to Bypass Apple’s System Integrity Protection
13
Jan
2025

Critical macOS Vulnerability Lets Hackers to Bypass Apple’s System Integrity Protection

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that allowed attackers to bypass Apple’s System Integrity Protection (SIP). Known…

CISA Launched A Free Guide to Enhance OT Products Security
13
Jan
2025

CISA Launched A Free Guide to Enhance OT Products Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new…

Microsoft Warns of MFA Issue Affecting Microsoft 365 users
13
Jan
2025

Microsoft Warns of MFA Issue Affecting Microsoft 365 users

Microsoft has issued a warning regarding an ongoing issue with Multi-Factor Authentication (MFA) that is impacting some Microsoft 365 (M365)…

RedCurl APT Deploys Malware via Windows Scheduled Tasks Exploitation
13
Jan
2025

RedCurl APT Deploys Malware via Windows Scheduled Tasks Exploitation

Researchers identified RedCurl APT group activity in Canada in late 2024, where the attackers used scheduled tasks to execute pcalua.exe…

Hackers Using YouTube Links and Microsoft 365 Themes to Steal Logins
13
Jan
2025

Hackers Using YouTube Links and Microsoft 365 Themes to Steal Logins

Cybercriminals are executing sophisticated phishing attacks targeting Microsoft 365 users by employing deceptive URLs that closely resemble legitimate O365 domains,…

Furry Hacker Breaches Scholastic Exposes Data of 8 Million People
13
Jan
2025

Furry Hacker Breaches Scholastic Exposes Data of 8 Million People

The education and publishing giant Scholastic has fallen victim to a significant data breach affecting approximately 8 million people. The…

PoC Exploit Released for Critical macOS Sandbox Vulnerability (CVE-2024-54498)
13
Jan
2025

PoC Exploit Released for Critical macOS Sandbox Vulnerability (CVE-2024-54498)

A proof-of-concept (PoC) exploit has been publicly disclosed for a critical vulnerability impacting macOS systems, identified as CVE-2024-54498. This vulnerability poses…

IBM Robotic Process Autmation Vulnerability Let Attackers Obtain Sensitive Data
13
Jan
2025

IBM Robotic Process Autmation Vulnerability Let Attackers Obtain Sensitive Data

A newly disclosed security vulnerability in IBM Robotic Process Automation (RPA) has raised concerns about potential data breaches. The vulnerability, tracked as CVE-2024-51456,…

Hackers Abusing Youtube To Deliver Malware That Steals Browser Data
13
Jan
2025

Hackers Abusing Youtube To Deliver Malware That Steals Browser Data

Malware actors leverage popular platforms like YouTube and social media to distribute fake installers. Reputable file hosting services are abused…