Category: GBHackers

Apache Pinot Vulnerability Allows Remote Attackers to Bypass Authentication
07
Mar
2025

Apache Pinot Vulnerability Allows Remote Attackers to Bypass Authentication

A critical security flaw (CVE-2024-56325) in Apache Pinot, a real-time distributed OLAP datastore, has been disclosed, allowing unauthenticated attackers to…

PrintSteal Cybercrime Group Mass-Producing Fake Aadhaar & PAN Cards
07
Mar
2025

PrintSteal Cybercrime Group Mass-Producing Fake Aadhaar & PAN Cards

A large-scale cybercrime operation dubbed “PrintSteal” has been exposed, revealing a complex network involved in the mass production and distribution…

Microsoft Warns of Silk Typhoon Hackers Exploiting Cloud Services to Attack IT Supply Chain
07
Mar
2025

Microsoft Warns of Silk Typhoon Hackers Exploiting Cloud Services to Attack IT Supply Chain

Microsoft Threat Intelligence has identified a significant shift in tactics by Silk Typhoon, a Chinese espionage group, now targeting common…

Hackers Exploit 'Any/Any' Communication Configurations in Cloud Services to Host Malware
07
Mar
2025

Hackers Exploit ‘Any/Any’ Communication Configurations in Cloud Services to Host Malware

Recent research by Veriti has uncovered a disturbing trend in cybersecurity: malicious actors are increasingly leveraging cloud infrastructure to distribute…

BadBox Malware Infects 50,000+ Android Devices via 24 Apps on Google Play
07
Mar
2025

BadBox Malware Infects 50,000+ Android Devices via 24 Apps on Google Play

HUMAN’s Satori Threat Intelligence and Research team has uncovered a complex cyberattack dubbed “BADBOX 2.0,” an evolution of the previously…

Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns
07
Mar
2025

Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns

Trend Micro’s Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC) attack that targeted multiple business partners….

Implementing Identity First Security for Zero Trust Architectures
06
Mar
2025

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit trust exists within a network. Every…

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks
06
Mar
2025

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive their targets. Recent findings from ESET’s…

Detecting Malicious Activities With Traffic Distribution Systems
06
Mar
2025

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious purposes, serving as sophisticated redirection networks…

New Powershell Module for Active Directory Assessment
06
Mar
2025

New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to streamline Active Directory (AD) assessments. Created…

Identifying Cyber Attack Patterns Through Threat Actor Infrastructure Analysis
06
Mar
2025

Identifying Cyber Attack Patterns Through Threat Actor Infrastructure Analysis

Kudelski Security Research recently published an article detailing advanced methods for tracking and analyzing threat actor infrastructure, providing valuable insights…

Critical IDOR Vulnerabilities in ZITADEL Let Hackers Modify Key Settings
06
Mar
2025

Critical IDOR Vulnerabilities in ZITADEL Let Hackers Modify Key Settings

Security researchers have disclosed critical Insecure Direct Object Reference (IDOR) vulnerabilities in ZITADEL’s administration interface that expose organizations to account takeover risks…