Category: GBHackers

Apache Jackrabbit Vulnrability Exposes Systems to Remote Code Execution Attacks
08
Sep
2025

Apache Jackrabbit Vulnrability Exposes Systems to Remote Code Execution Attacks

A new security flaw has been discovered in Apache Jackrabbit, a widely used content repository system, potentially exposing thousands of…

LunaLock Ransomware Attacking Artists to Steal and Encrypt Data
08
Sep
2025

LunaLock Ransomware Attacking Artists to Steal and Encrypt Data

LunaLock, a newly surfaced ransomware strain, has launched a targeted campaign against independent artists and their clients, demanding a hefty…

Kimsuky Hackers’ Playbook Uncovered in Exposed ‘Kim’ Data Dump
08
Sep
2025

Kimsuky Hackers’ Playbook Uncovered in Exposed ‘Kim’ Data Dump

A rare breach attributed to a North Korean–affiliated actor named “Kim” by the leakers has unveiled unprecedented insight into Kimsuky…

Hackers Exploit Amazon SES to Blast Over 50,000 Malicious Emails Daily
08
Sep
2025

Hackers Exploit Amazon SES to Blast Over 50,000 Malicious Emails Daily

A sophisticated cyberattack campaign where threat actors exploited compromised AWS credentials to hijack Amazon’s Simple Email Service (SES), launching large-scale…

Web Application Firewall Bypassed via JS Injection with Parameter Pollution
08
Sep
2025

Web Application Firewall Bypassed via JS Injection with Parameter Pollution

In a recent autonomous penetration test, a novel cross-site scripting (XSS) bypass that sidesteps even highly restrictive Web Application Firewalls…

PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access
08
Sep
2025

PgAdmin Vulnerability Allows Attackers to Gain Unauthorized Account Access

A newly disclosed security flaw in pgAdmin4, the widely used open-source tool for managing PostgreSQL databases, has raised serious concerns among…

How Microsoft Azure Storage Logs Help Investigate Security Breaches
08
Sep
2025

How Microsoft Azure Storage Logs Help Investigate Security Breaches

When a security breach occurs, vital evidence often appears in unexpected places. One such source is Microsoft Azure Storage logs, which…

U.S. Officials Investigating Cyber Threat Aimed at China Trade Talks
08
Sep
2025

U.S. Officials Investigating Cyber Threat Aimed at China Trade Talks

According to the Wall Street Journal, the deceptive message, purporting to come from Representative John Moolenaar, was dispatched in July…

Atomic Stealer Hidden in Pirated Software
08
Sep
2025

Atomic Stealer Hidden in Pirated Software

The cybersecurity landscape for macOS users has taken a dangerous turn as cybercriminals increasingly target Apple’s ecosystem with sophisticated malware…

Australian Authorities Expose Ransomware Gangs and Their Hidden Careers
08
Sep
2025

Australian Authorities Expose Ransomware Gangs and Their Hidden Careers

Groundbreaking research reveals the inner workings of cybercriminal networks targeting Australia and allied nations. Australian researchers have completed a comprehensive…

Tenable Data Breach Confirmed -Customer Contact Details Compromised
08
Sep
2025

Tenable Data Breach Confirmed -Customer Contact Details Compromised

Tenable, a well-known cybersecurity company, has confirmed that it was affected by a recent large-scale data theft campaign. The attack…

Hackers Exploit Fake Microsoft Teams Site to Spread Odyssey macOS Stealer
08
Sep
2025

Hackers Exploit Fake Microsoft Teams Site to Spread Odyssey macOS Stealer

Cybercriminals have escalated their attacks against macOS users by deploying a sophisticated new campaign that leverages a fraudulent Microsoft Teams…