Category: GBHackers

Hacker Dumped MacBook in River in Attempt to Destroy Digital Evidence
29
Dec
2025

Hacker Dumped MacBook in River in Attempt to Destroy Digital Evidence

A former employee of South Korean e-commerce giant Coupang attempted to destroy evidence of a massive data theft by throwing…

MongoBleed Detector Launched to Identify Critical MongoDB Flaw (CVE-2025-14847)
29
Dec
2025

MongoBleed Detector Launched to Identify Critical MongoDB Flaw (CVE-2025-14847)

Security researchers have released an open-source detection tool to help organizations identify potential exploitation of MongoBleed (CVE-2025-14847), a critical memory…

Hacktivist Proxies and the Normalization of Cyber Pressure Campaigns
29
Dec
2025

Hacktivist Proxies and the Normalization of Cyber Pressure Campaigns

A significant shift in the cyber threat landscape has been identified in a new research report, distinguishing modern “Hacktivist Proxy…

Hackers Compromise Trust Wallet Chrome Extension, Users Claim Millions Stolen
27
Dec
2025

Hackers Compromise Trust Wallet Chrome Extension, Users Claim Millions Stolen

Trust Wallet users suffered devastating losses exceeding $7 million after cybercriminals compromised the Chrome browser extension version 2.68.0, released on…

Google Introduces Option to Change @gmail.com Email Addresses
26
Dec
2025

Google Introduces Option to Change @gmail.com Email Addresses

For years, Google users have been stuck with the email addresses they created when they first signed up. If you…

Critical LangChain Vulnerability Allows Attackers to Steal Sensitive Secrets
26
Dec
2025

Critical LangChain Vulnerability Allows Attackers to Steal Sensitive Secrets

A critical security vulnerability in LangChain, one of the world’s most widely deployed AI frameworks, enables attackers to extract environment…

Unpatched FortiGate Security Flaw Allows Attackers to Bypass 2FA Controls
25
Dec
2025

Unpatched FortiGate Security Flaw Allows Attackers to Bypass 2FA Controls

A critical authentication bypass vulnerability in FortiGate devices enables threat actors to circumvent two-factor authentication (2FA) protections through case-sensitive username…

NtKiller Malware Advertised on Dark Web With Claims of Antivirus and EDR Bypass
25
Dec
2025

NtKiller Malware Advertised on Dark Web With Claims of Antivirus and EDR Bypass

A new and sophisticated defensive evasion tool dubbed “NtKiller” has surfaced on underground cybercrime forums, marketed by a threat actor known as “AlphaGhoul.” …

Net-SNMP Vulnerability Triggers Buffer Overflow, Crashing the Daemon
25
Dec
2025

Net-SNMP Vulnerability Triggers Buffer Overflow, Crashing the Daemon

A critical buffer overflow vulnerability in Net-SNMP’s snmptrapd daemon allows remote attackers to crash the service by sending specially crafted…

M-Files Vulnerability Allows Attackers to Steal Active User Session Tokens
25
Dec
2025

M-Files Vulnerability Allows Attackers to Steal Active User Session Tokens

A critical security vulnerability in M-Files Server could allow authenticated attackers to capture active user session tokens via the M-Files…

Israeli Organizations Targeted by AV-Themed Malicious Word and PDF Files
24
Dec
2025

Israeli Organizations Targeted by AV-Themed Malicious Word and PDF Files

SEQRITE Labs’ Advanced Persistent Threat (APT) Team has uncovered a sophisticated campaign targeting Israeli organizations through weaponized Microsoft Word and…

NVIDIA Isaac Vulnerabilities Enable Remote Code Execution Attacks
24
Dec
2025

NVIDIA Isaac Vulnerabilities Enable Remote Code Execution Attacks

NVIDIA released critical security updates for its Isaac Launchable platform on December 23, 2025, addressing three severe vulnerabilities that could…