Category: GBHackers

Microsoft Adds Azure Firewall With AI-Powered Security Copilot
19
Nov
2025

Microsoft Adds Azure Firewall With AI-Powered Security Copilot

Microsoft has integrated Azure Firewall with its AI-powered Security Copilot platform, bringing natural language threat investigation capabilities to cloud network…

Critical SolarWinds Serv-U Flaws Allow Remote Admin-Level Code Execution
19
Nov
2025

Critical SolarWinds Serv-U Flaws Allow Remote Admin-Level Code Execution

SolarWinds has released an urgent security update for its Serv-U file transfer software, patching three critical vulnerabilities that could enable…

New npm Malware Campaign Checks If Visitor Is a Victim or Researcher Before Initiating Infection
19
Nov
2025

New npm Malware Campaign Checks If Visitor Is a Victim or Researcher Before Initiating Infection

The Socket Threat Research Team has uncovered a sophisticated npm malware campaign orchestrated by the threat actor dino_reborn, who deployed…

New FortiWeb 0-Day Code Execution Flaw Actively Exploited
19
Nov
2025

New FortiWeb 0-Day Code Execution Flaw Actively Exploited

Fortinet has disclosed a critical OS command injection vulnerability affecting multiple versions of FortiWeb that is currently being exploited in…

New ShadowRay Exploit Targets Vulnerability in Ray AI Framework to Attack AI Systems
19
Nov
2025

New ShadowRay Exploit Targets Vulnerability in Ray AI Framework to Attack AI Systems

Oligo Security researchers have uncovered an active global hacking campaign that leverages artificial intelligence to attack AI infrastructure. The operation,…

Authorities Confiscate Thousands of Servers from Illicit Hosting Company Linked to Cyberattacks
19
Nov
2025

Authorities Confiscate Thousands of Servers from Illicit Hosting Company Linked to Cyberattacks

In a landmark operation targeting cybercriminal infrastructure, the East Netherlands cybercrime team conducted a major takedown of a rogue hosting…

Google Play Store to Show Warning for Power-Hungry Apps
19
Nov
2025

Google Play Store to Show Warning for Power-Hungry Apps

Google is taking decisive action against apps that drain excessive battery power, introducing a new warning system that will alert…

How Attackers Are Deceiving Users to Expose Sensitive Information
19
Nov
2025

How Attackers Are Deceiving Users to Expose Sensitive Information

Scams and threats circulating on messaging apps like WhatsApp demonstrate how easily trusted platforms can be weaponized against users. One…

DoorDash Confirms Data Breach Compromised User Data
19
Nov
2025

DoorDash Confirms Data Breach Compromised User Data

DoorDash has publicly disclosed a cybersecurity incident in which an unauthorized third party gained access to specific user information through…

Donor Information Exposed in Compromised Database
19
Nov
2025

Donor Information Exposed in Compromised Database

Princeton University confirmed on November 15 that an Advancement database containing sensitive personal information about alums, donors, faculty members, students,…

New EchoGram Trick Makes AI Models Accept Dangerous Inputs
19
Nov
2025

New EchoGram Trick Makes AI Models Accept Dangerous Inputs

Security researchers at HiddenLayer have uncovered a critical vulnerability that exposes fundamental weaknesses in the guardrails protecting today’s most powerful…

SpyCloud Unveils Top 10 Cybersecurity Predictions Poised to Disrupt Identity Security in 2026
19
Nov
2025

SpyCloud Unveils Top 10 Cybersecurity Predictions That Will Disrupt Identity Security in 2026

Austin, TX/USA, November 18th, 2025, CyberNewsWire Forecast report highlights surge in identity-based threats, evolving threat actor tactics, and increased risk…