Category: GBHackers

Operating principle of secp256k1-ECIES.
18
Nov
2025

Encryption Mechanics, Operational Model, and Data Exfiltration Methods

A newly identified ransomware group, Yurei, has emerged as a significant threat to organizations worldwide, with confirmed attacks targeting entities…

CISA Alerts on Critical Lynx+ Gateway Flaw Leaks Data in Cleartext
18
Nov
2025

CISA Alerts on Critical Lynx+ Gateway Flaw Leaks Data in Cleartext

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert regarding multiple vulnerabilities affecting General Industrial Controls’…

Inside the Criminal Networks Hijacking Payroll Systems
18
Nov
2025

Inside the Criminal Networks Hijacking Payroll Systems

Cyber threats don’t always come with warning signs. Sometimes, they arrive as sponsored ads. Since mid-2023, a financially motivated network…

70 Million Devices Vulnerable Due to Logic Flaw Exposing Internal Networks
18
Nov
2025

70 Million Devices Vulnerable Due to Logic Flaw Exposing Internal Networks

A critical logic flaw discovered in the widely used mPDF PHP library could expose internal networks and sensitive services on…

Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea
17
Nov
2025

Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea

Menlo Park, California, USA, November 17th, 2025, CyberNewsWire AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms (CNAPP),…

FortiWeb WAF Flaw Actively Exploited to Establish Admin Access and Seize Total Control
17
Nov
2025

FortiWeb WAF Flaw Actively Exploited to Establish Admin Access and Seize Total Control

Fortinet has released urgent security updates to address a critical vulnerability in its FortiWeb Web Application Firewall (WAF) that is…

Hackers Weaponize XWiki Flaw to Build and Rent Out Botnet Networks
17
Nov
2025

Hackers Weaponize XWiki Flaw to Build and Rent Out Botnet Networks

Cybersecurity researchers have observed a dramatic escalation in attacks exploiting a critical XWiki vulnerability, with multiple threat actors now leveraging…

New Detection Methods Uncovered for Outlook NotDoor Backdoor Malware
17
Nov
2025

New Detection Methods Uncovered for Outlook NotDoor Backdoor Malware

Cybersecurity researchers have unveiled comprehensive detection methodologies for NotDoor, a sophisticated backdoor malware that leverages Microsoft Outlook macros for covert…

North Korean Hackers Breach 136 U.S. Companies, Earning $2.2 Million
17
Nov
2025

North Korean Hackers Breach 136 U.S. Companies, Earning $2.2 Million

The U.S. Justice Department has announced a significant crackdown on North Korean cybercrime operations, securing five guilty pleas and initiating…

Alice Blue Partners With AccuKnox For Regulatory Compliance
17
Nov
2025

Alice Blue Partners With AccuKnox For Regulatory Compliance

AccuKnox, a global leader in Zero Trust Cloud-Native Application Protection Platforms(CNAPP), today announced its partnership with Alice Blue India, a…

Iran-Linked SpearSpecter Campaign Leveraging Personalized Social Engineering Against High-Value Officials
17
Nov
2025

Iran-Linked SpearSpecter Campaign Leveraging Personalized Social Engineering Against High-Value Officials

Iranian threat actors aligned with the Islamic Revolutionary Guard Corps Intelligence Organization (IRGC-IO) are conducting a sophisticated espionage campaign tracked…

Critical RCE Flaws in AI Inference Engines Expose Meta, Nvidia, and Microsoft Frameworks
17
Nov
2025

Critical RCE Flaws in AI Inference Engines Expose Meta, Nvidia, and Microsoft Frameworks

Security researchers at Oligo Security have uncovered a series of critical Remote Code Execution vulnerabilities affecting widely deployed AI inference…