Category: GBHackers

BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration
13
Nov
2025

BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration

New York, New York, November 13th, 2025, CyberNewsWire BreachLock, a global leader in offensive security, just announced a powerful new…

OpenAI Sora 2 Vulnerability Allows Exposure of Hidden System Prompts from Audio Data
13
Nov
2025

OpenAI Sora 2 Vulnerability Allows Exposure of Hidden System Prompts from Audio Data

Security researchers have successfully extracted the system prompt from OpenAI’s Sora 2 video generation model by exploiting cross-modal vulnerabilities, with…

Hackers Infiltrate npm Registry with 43,000 Spam Packages, Linger for Nearly Two Years
13
Nov
2025

Hackers Infiltrate npm Registry with 43,000 Spam Packages, Linger for Nearly Two Years

Security researcher Paul McCarty has uncovered a massive coordinated spam campaign targeting the npm ecosystem. The IndonesianFoods worm, comprising over…

Malicious npm Package with 206K Downloads Targeting GitHub Repositories to Steal Tokens
13
Nov
2025

Malicious npm Package with 206K Downloads Targeting GitHub Repositories to Steal Tokens

On Friday, November 7th, Veracode Threat Research discovered a dangerous typosquatting campaign targeting developers using GitHub Actions. The malicious npm…

Threat Actors Use JSON Storage for Hosting and Delivering Malware via Trojanized Code
13
Nov
2025

Threat Actors Use JSON Storage for Hosting and Delivering Malware via Trojanized Code

A sophisticated campaign attributed to North Korean-aligned threat actors is weaponizing legitimate JSON storage services as an effective vector for…

CISA Warns of Active Exploitation of Windows Kernel 0-Day Enabling Privilege Escalation
13
Nov
2025

CISA Warns of Active Exploitation of Windows Kernel 0-Day Enabling Privilege Escalation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about the active exploitation of a new zero-day…

Hackers Using RMM Tools LogMeIn and PDQ Connect to Deploy Malware as Legitimate Software
13
Nov
2025

Hackers Using RMM Tools LogMeIn and PDQ Connect to Deploy Malware as Legitimate Software

Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have uncovered a sophisticated attack campaign leveraging legitimate Remote Monitoring and Management…

GitLab Vulnerabilities Expose Users to Prompt Injection Attacks and Data Theft
13
Nov
2025

GitLab Vulnerabilities Expose Users to Prompt Injection Attacks and Data Theft

GitLab has released critical security patches addressing nine vulnerabilities across Community Edition (CE) and Enterprise Edition (EE), including a concerning prompt…

Authorities Takedown 1,025 Servers Linked to Rhadamanthys, VenomRAT, and Elysium
13
Nov
2025

Authorities Takedown 1,025 Servers Linked to Rhadamanthys, VenomRAT, and Elysium

Between November 10 and 14, 2025, law enforcement agencies executed one of the most significant coordinated operations against cybercriminals in…

Kibana Vulnerabilities Expose Systems to SSRF and XSS Attacks
13
Nov
2025

Kibana Vulnerabilities Expose Systems to SSRF and XSS Attacks

Elastic has released a security advisory addressing an origin validation error in Kibana that could expose systems to Server-Side Request Forgery (SSRF)…

Malicious Chrome Extension Grants Full Control Over Ethereum Wallet
13
Nov
2025

Malicious Chrome Extension Grants Full Control Over Ethereum Wallet

Security researchers have uncovered a sophisticated supply chain attack disguised as a legitimate cryptocurrency wallet. Socket’s Threat Research Team discovered…

New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware
13
Nov
2025

New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware

Security researchers have uncovered a sophisticated malware campaign that leverages the ClickFix social engineering technique to distribute information-stealing malware across…