Category: GBHackers

Hackers Use Salesforce Gainsight Breach to Access Data from More Than 200 Companies
22
Nov
2025

Hackers Use Salesforce Gainsight Breach to Access Data from More Than 200 Companies

Salesforce has disclosed a significant security incident involving unauthorized access to customer data through compromised Gainsight-published applications. The breach, detected…

CISA Issues Warning as Hackers Target Oracle Identity Manager RCE Flaw
22
Nov
2025

CISA Issues Warning as Hackers Target Oracle Identity Manager RCE Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a new Oracle vulnerability to its Known Exploited Vulnerabilities (KEV)…

Clop Ransomware Claims Broadcom Breach Through E-Business Suite 0-Day
22
Nov
2025

Clop Ransomware Claims Broadcom Breach Through E-Business Suite 0-Day

The notorious Cl0p ransomware gang has publicly claimed responsibility for breaching Broadcom, a leading semiconductor and infrastructure software company. According…

UNC2891 Hackers Use Raspberry Pi and Fake Cards to Steal ATM Cash
21
Nov
2025

UNC2891 Hackers Use Raspberry Pi and Fake Cards to Steal ATM Cash

A secretive cybercrime group called UNC2891 has been quietly draining ATMs across Southeast Asian banks for years, using an ingenious…

Hackers Adopt Matrix Push C2 for Browser-Based Malware and Phishing Attacks
21
Nov
2025

Hackers Adopt Matrix Push C2 for Browser-Based Malware and Phishing Attacks

A new breed of browser-based cyberattack is sweeping the threat landscape, as BlackFog researchers have uncovered. Dubbed Matrix Push C2,…

Windows 11 to Prevent BSOD Error Messages from Showing Publicly
21
Nov
2025

Windows 11 to Prevent BSOD Error Messages from Showing Publicly

Microsoft has announced a significant Windows 11 update that will prevent the Blue Screen of Death (BSOD) and other system…

North Korean Kimsuky and Lazarus Teams Target Critical Sectors with Zero-Day Exploits
21
Nov
2025

North Korean Kimsuky and Lazarus Teams Target Critical Sectors with Zero-Day Exploits

North Korea’s two most formidable APT groups Kimsuky and Lazarus have established a coordinated operational framework that combines intelligence gathering…

Dark Web Job Market Evolved
21
Nov
2025

Dark Web Job Market Evolved

The underground labor market has undergone a significant transformation. According to new research analyzing 2,225 job-related posts collected from shadow…

AI-Driven Obfuscated Malicious Apps Bypassing Antivirus Detection to Deliver Malicious Payloads
21
Nov
2025

AI-Driven Obfuscated Malicious Apps Bypassing Antivirus Detection to Deliver Malicious Payloads

Cybersecurity researchers have identified a sophisticated malware campaign leveraging artificial intelligence to enhance obfuscation techniques, enabling malicious applications to circumvent…

Advanced Features Bypass AI Detection and Steal Password Manager Data
21
Nov
2025

Advanced Features Bypass AI Detection and Steal Password Manager Data

The Python-based information-stealing tool Xillen Stealer has reached versions 4 and 5, significantly expanding its targeting capabilities and functionality across…

Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Gain Higher Privileges
21
Nov
2025

Critical Azure Bastion Vulnerability Lets Attackers Bypass Login and Gain Higher Privileges

Microsoft disclosed a critical authentication bypass vulnerability in Azure Bastion, its managed remote access service, enabling attackers to escalate privileges…

Windows Graphics Flaw Lets Hackers Take Over with Just One Image
21
Nov
2025

Windows Graphics Flaw Lets Hackers Take Over with Just One Image

Security researchers have identified a dangerous flaw in the Windows Graphics Component that enables attackers to seize complete control of…