Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Chrome Use-After-Free Flaw Lets Attackers Execute Arbitrary Code

Google has released a critical security update for Chrome browser users after discovering a dangerous use-after-free vulnerability that could allow cybercriminals to execute malicious code on victims’ computers. The flaw, tracked as CVE-2025-11756, affects Chrome’s Safe Browsing feature and has…

FortiOS CLI Bypass Flaw Lets Attackers Run Arbitrary System Commands

Fortinet has disclosed a security vulnerability affecting its FortiOS operating system that could allow attackers with administrative privileges to execute unauthorized system commands by bypassing command line interface restrictions. The flaw, tracked as CVE-2025-58325, was discovered internally by Fortinet’s PSIRT…

Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence

The China-backed advanced persistent threat group Flax Typhoon maintained year-long access to an ArcGIS system by turning trusted software into a persistent backdoor—an attack so unique it prompted the vendor to update its documentation. The attackers repurposed a legitimate Java…

NCSC Issues Warning as UK Sees Four Cyber Attacks a Week

British organisations are facing an unprecedented cyber security crisis as the National Cyber Security Centre reveals a dramatic surge in attacks threatening the nation’s digital infrastructure. This alarming escalation translates to an average of four major cyber attacks targeting UK…

Pro-Russian Hacktivists Target Government, Finance and E-Commerce Sites

The pro-Russian hacktivist collective NoName057(16) has emerged as a notable participant in a coordinated wave of cyberattacks targeting Israeli infrastructure during the October 7 anniversary period. The group claimed responsibility for multiple distributed denial-of-service (DDoS) attacks against government portals, financial…

Hackers Use Court-Themed Phishing to Deliver Info-Stealer Malware

A novel phishing campaign has emerged targeting Colombian users by abusing judicial notifications and weaponizing Scalable Vector Graphics (SVG) files. This sophisticated attack begins with a carefully crafted Spanish-language email impersonating the “17th Municipal Civil Court of the Bogotá Circuit,”…

Malicious NPM Packages Used in Sophisticated Developer Cyberattack

In October 2025, security researchers uncovered an unprecedented phishing campaign that weaponizes the npm ecosystem—not by infecting developers during package installation, but by abusing the unpkg.com CDN as a disposable hosting platform for malicious JavaScript. By seeding over 175 throwaway…