Category: GBHackers
A recent investigation has uncovered that relying solely on large language models (LLMs) to generate application code can introduce critical…
The Cybersecurity and Infrastructure Security Agency (CISA) unveiled a comprehensive Cybersecurity Advisory (CSA) designed to empower network defenders to detect,…
A critical zero-day remote code execution (RCE) vulnerability is currently threatening the security of over 28,000 Citrix instances worldwide. The flaw, designated…
A widespread service disruption is currently affecting Microsoft Teams users across the globe, preventing access to embedded Office documents within the collaboration…
South Korean authorities have successfully extradited a key suspect in a large-scale hacking operation that resulted in the embezzlement of…
Path traversal flaws like Zip Slip, which give hackers the ability to alter file systems while decompressing, remain a serious…
Cybersecurity researchers at Huntress identified a novel ransomware variant dubbed Cephalus, deployed in two separate incidents targeting organizations lacking robust…
A newly documented cache deception attack leverages mismatches in path normalization and delimiter handling between caching layers and origin servers…
The Underground ransomware gang has been coordinating recurring attacks on enterprises throughout the globe in a worrying increase in cyber…
Nagios has addressed a significant cross-site scripting (XSS) vulnerability in its enterprise monitoring platform Nagios XI that could allow remote…
NVIDIA released a security bulletin for NVIDIA® NeMo Curator addressing a high-severity vulnerability (CVE-2025-23307) that affects all prior versions of…
The threat actor known as TAG-144, also referred to as Blind Eagle or APT-C-36, has been linked to five distinct…











