Category: GBHackers

Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments
14
Nov
2025

Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments

Cisco Talos has identified an emerging threat from Kraken, a sophisticated cross-platform ransomware group that has emerged from the remnants…

Android Photo Frame App Infects Devices With Malware, Allows Full Remote Takeover
14
Nov
2025

Android Photo Frame App Infects Devices With Malware, Allows Full Remote Takeover

A recent investigation has uncovered alarming security vulnerabilities in Android-powered digital photo frames, turning what should be a simple home…

Critical Zoho Analytics Plus Flaw Allows Attackers to Run Arbitrary SQL Queries
14
Nov
2025

Critical Zoho Analytics Plus Flaw Allows Attackers to Run Arbitrary SQL Queries

A critical unauthenticated SQL injection vulnerability has been discovered in Zoho Analytics Plus on-premise, posing a severe risk to organizations…

Washington Post Oracle E-Suite Breach Exposes Data of Over 9,000 Staff and Contractors
14
Nov
2025

Washington Post Oracle E-Suite Breach Exposes Data of Over 9,000 Staff and Contractors

The Washington Post disclosed a significant data breach affecting more than 9,700 employees and contractors following an external system compromise…

Critical Imunify360 Vulnerability Exposes Millions of Linux-Hosted Sites to RCE Attacks
14
Nov
2025

Critical Imunify360 Vulnerability Exposes Millions of Linux-Hosted Sites to RCE Attacks

A critical Remote Code Execution vulnerability has been patched in Imunify360 AV, a security product protecting approximately 56 million websites…

Lumma Stealer Leverages Browser Fingerprinting for Data Theft and Stealthy C2 Communications
14
Nov
2025

Lumma Stealer Leverages Browser Fingerprinting for Data Theft and Stealthy C2 Communications

Following the doxxing of Lumma Stealer’s alleged core members last month, the notorious infostealer initially experienced a significant decline in…

Akira Ransomware Has Extracted $42M After Targeting Hundreds
14
Nov
2025

Akira Ransomware Has Extracted $42M After Targeting Hundreds

A newly updated cybersecurity advisory from federal agencies reveals that the Akira ransomware operation has significantly escalated its campaign, compromising…

Checkout.com Suffers Data Breach as ShinyHunters Attack Cloud Storage
14
Nov
2025

Checkout.com Suffers Data Breach as ShinyHunters Attack Cloud Storage

Payment processor Checkout.com recently experienced a data breach after being targeted by the cybercrime group “ShinyHunters.” The attackers accessed old…

Palo Alto PAN-OS Flaw Lets Attackers Force Firewall Reboots via Malicious Packets
14
Nov
2025

Palo Alto PAN-OS Flaw Lets Attackers Force Firewall Reboots via Malicious Packets

Palo Alto Networks has disclosed a denial-of-service vulnerability in its PAN-OS software that allows attackers to force firewalls into unexpected…

BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration
13
Nov
2025

BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration

New York, New York, November 13th, 2025, CyberNewsWire BreachLock, a global leader in offensive security, just announced a powerful new…

OpenAI Sora 2 Vulnerability Allows Exposure of Hidden System Prompts from Audio Data
13
Nov
2025

OpenAI Sora 2 Vulnerability Allows Exposure of Hidden System Prompts from Audio Data

Security researchers have successfully extracted the system prompt from OpenAI’s Sora 2 video generation model by exploiting cross-modal vulnerabilities, with…

Hackers Infiltrate npm Registry with 43,000 Spam Packages, Linger for Nearly Two Years
13
Nov
2025

Hackers Infiltrate npm Registry with 43,000 Spam Packages, Linger for Nearly Two Years

Security researcher Paul McCarty has uncovered a massive coordinated spam campaign targeting the npm ecosystem. The IndonesianFoods worm, comprising over…