Category: GBHackers

New GhostAction Attack Compromises 327 GitHub Users and 817 Repositories
08
Sep
2025

New GhostAction Attack Compromises 327 GitHub Users and 817 Repositories

Security researchers uncovered a large-scale attack campaign now identified as GhostAction, which compromised secrets belonging to 327 GitHub users and impacted 817 repositories. The…

Wealthsimple Data Breach - User Information Leaked Online
08
Sep
2025

Wealthsimple Data Breach – User Information Leaked Online

Canadian financial technology company Wealthsimple disclosed a data security incident on September 5, 2025, revealing that personal information belonging to…

Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks
06
Sep
2025

Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks

The year 2025 has unfolded in an environment marked by eroding trust in vulnerability databases, an explosive growth in cyberattacks,…

CISA Issues Alert on Android 0-Day Use-After-Free Vulnerability Under Active Exploitation
05
Sep
2025

CISA Issues Alert on Android 0-Day Use-After-Free Vulnerability Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert for a newly discovered zero-day vulnerability in the…

Over 143,000 Malware Files Target Android and iOS Users in Q2 2025
05
Sep
2025

Over 143,000 Malware Files Target Android and iOS Users in Q2 2025

In the second quarter of 2025, users of Android and iOS devices faced relentless cyberthreats, with Kaspersky Security Network reporting…

Microsoft Tapped China Engineers for SharePoint Support
05
Sep
2025

Microsoft Tapped China Engineers for SharePoint Support

A new investigation has revealed that Microsoft relied on China-based engineers to provide technical support and bug fixes for SharePoint,…

New Exploit Bypasses Code Integrity to Backdoor Signal, 1Password, Slack, and More
05
Sep
2025

New Exploit Bypasses Code Integrity to Backdoor Signal, 1Password, Slack, and More

A new security exploit has been discovered that lets attackers slip malicious code into widely used desktop applications including Signal,…

Critical SAP S/4HANA Vulnerability Actively Exploited, Allowing Full System Takeover
05
Sep
2025

Critical SAP S/4HANA Vulnerability Actively Exploited, Allowing Full System Takeover

A critical security flaw in SAP S/4HANA, tracked as CVE-2025-42957, is being actively exploited by attackers, according to research from…

Threat Actors Exploit ScreenConnect Installers for Initial Access
05
Sep
2025

Threat Actors Exploit ScreenConnect Installers for Initial Access

A marked escalation in the abuse of ConnectWise ScreenConnect installers since March 2025, with U.S.-based businesses bearing the brunt of…

SafePay Ransomware Hits 73 Organizations in Just One Month
05
Sep
2025

SafePay Ransomware Hits 73 Organizations in Just One Month

SafePay, an emerging ransomware group, has rapidly ascended from obscurity to notoriety in 2025. In June alone, the group claimed…

TAG-150 Hackers Escalate Attacks with Proprietary Malware Families
05
Sep
2025

TAG-150 Hackers Escalate Attacks with Proprietary Malware Families

A sophisticated threat actor, TAG-150, active since at least March 2025. Characterized by rapid malware development, technical sophistication, and a…

TP-Link Vulnerabilities Under Active Exploitation
05
Sep
2025

TP-Link Vulnerabilities Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding critical vulnerabilities in popular TP-Link router models…