Category: GBHackers

SmartTube Android TV App Compromised After Signing Keys Leak
02
Dec
2025

SmartTube Android TV App Compromised After Signing Keys Leak

SmartTube, a popular open-source YouTube client for Android TV devices with over 25,900 GitHub stars, has been compromised after its…

Evilginx Attack Techniques Allow Hackers to Defeat MFA Through SSO Phishing
02
Dec
2025

Evilginx Attack Techniques Allow Hackers to Defeat MFA Through SSO Phishing

A sophisticated threat actor has been conducting a persistent phishing campaign against United States educational institutions since April 2025, leveraging…

Ukrainian Hackers Target Russian Aerospace and Defense Sectors
02
Dec
2025

Ukrainian Hackers Target Russian Aerospace and Defense Sectors

Multiple Ukrainian hacktivist groups have launched an extensive spearphishing campaign targeting Russia’s critical aerospace and defence industries, according to a…

nopCommerce Flaw Lets Attackers Access Accounts Using Captured Cookies
02
Dec
2025

nopCommerce Flaw Lets Attackers Access Accounts Using Captured Cookies

Security researchers have uncovered a serious vulnerability in nopCommerce, a popular open-source ecommerce platform used by major companies, including Microsoft,…

Early Indicators of Insider Threats Through Authentication and Access Controls
02
Dec
2025

Early Indicators of Insider Threats Through Authentication and Access Controls

Security researchers at Nisos have identified a critical gap in insider threat detection: organizations often fail to correlate early behavioral…

Dash Cam Hack: How Criminals Can Seize Control in Seconds
02
Dec
2025

Dash Cam Hack: How Criminals Can Seize Control in Seconds

Dashcams have become an essential accessory in vehicles across many countries, serving as impartial witnesses in the event of accidents…

AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
02
Dec
2025

AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk

Baltimore, MD, December 2nd, 2025, CyberNewsWire The 2025 State of AI Data Security Report reveals a widening contradiction in enterprise…

Cyber Startup Frenetik Launches Patented Deception Technology to Counter the AI Arms Race
02
Dec
2025

Cyber Startup Frenetik Launches Patented Deception Technology to Counter the AI Arms Race

Bethesda, USA / Maryland, December 2nd, 2025, CyberNewsWire While most cybersecurity companies pour resources into AI models, massive compute, hoovering…

Sonesta International Hotels Implements Industry-Leading Cloud Security Through AccuKnox Collaboration
02
Dec
2025

Sonesta International Hotels Implements Industry-Leading Cloud Security Through AccuKnox Collaboration

Travel and hospitality industry leader Sonesta International Hotels partners with AccuKnox to deploy Zero Trust Integrated Application and Cloud Security…

Hackers Exploit Telegram, WinSCP, Chrome, and Teams to Deliver ValleyRat Malware
02
Dec
2025

Hackers Exploit Telegram, WinSCP, Chrome, and Teams to Deliver ValleyRat Malware

Researchers have uncovered a sophisticated malware campaign where threat actors weaponize trojanized installers for popular productivity applications to deploy ValleyRat,…

OpenVPN Flaws Allow Hackers to Launch DoS Attacks and Bypass Security Checks
02
Dec
2025

OpenVPN Flaws Allow Hackers to Launch DoS Attacks and Bypass Security Checks

Security researchers have uncovered three significant vulnerabilities in OpenVPN, one of the world’s most trusted open-source virtual private network (VPN)…

Azure API Management Vulnerability Lets Attackers Create Accounts Across Tenants
02
Dec
2025

Azure API Management Vulnerability Lets Attackers Create Accounts Across Tenants

A critical security flaw in the Azure API Management Developer Portal enables attackers to bypass administrator controls and register accounts…