Category: GBHackers

CrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection
23
Apr
2025

CrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection

CrowdStrike today announced the general availability of Falcon® Privileged Access, a breakthrough module in its Falcon® Identity Protection suite, aimed…

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders
23
Apr
2025

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders

Leading British retailer Marks & Spencer Group plc (M&S) has confirmed it has been grappling with a cyberattack over the…

Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges
23
Apr
2025

Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges

Research disclosed a now-patched high-severity vulnerability in Google Cloud Platform’s (GCP) Cloud Composer service, dubbed ConfusedComposer. It could have allowed attackers…

Moodle Core vulnerabilities Allow Attackers to Evade Security Measures
23
Apr
2025

Moodle Core vulnerabilities Allow Attackers to Evade Security Measures

A recent security audit has uncovered critical vulnerabilities within Moodle, the widely used open-source learning management system (LMS). These vulnerabilities…

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With no expiration!
22
Apr
2025

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With no expiration!

A glaring vulnerability has come to light within Samsung’s One UI interface: the clipboard history function stores all copied text,…

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index
22
Apr
2025

Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro’s Cyber Risk Exposure Management (CREM) solution has highlighted the critical role that timely patching plays in reducing an…

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft
22
Apr
2025

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on the Python Package Index (PyPI)…

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans
22
Apr
2025

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure named “Cloudflare tunnel infrastructure to…

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs
22
Apr
2025

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge devices playing a critical role…

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload
22
Apr
2025

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting systems. This utility, intended for…

Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025 - GBHackers Security
22
Apr
2025

Criminal IP to Showcase Advanced Threat Intelligence at RSAC 2025 – GBHackers Security

Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 – May 1, 2025 Criminal IP,…

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands
22
Apr
2025

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…