Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Hackers Exploit Quest KACE SMA Flaw to Harvest Credentials

Security Researchers have detected active exploitation targeting unpatched Quest KACE Systems Management Appliance (SMA) instances. Starting the week of March 9, 2026, threat actors began leveraging a critical authentication bypass vulnerability, identified as CVE-2025-32975, to infiltrate corporate networks, harvest sensitive…

511,000+ End-of-Life IIS Instances Found Online, Raising Security Risks

Security researchers at The Shadowserver Foundation have identified a massive internet-facing attack surface, discovering more than 511,000 End-of-Life Microsoft Internet Information Services (IIS) instances currently active online. This widespread deployment of outdated web servers presents a significant security risk to…

$30 IP-KVM Flaws Could Enable BIOS-Level Enterprise Network Attacks

Recent threat research reveals a severe security crisis affecting low-cost IP-KVM devices. Security experts discovered nine vulnerabilities across four popular vendors, transforming these cheap management tools into powerful attack platforms. Compromising a single KVM device grants an attacker complete physical-level…

CanisterWorm Hijacks npm Publisher Accounts, Steals Tokens

A highly automated npm supply chain campaign, dubbed “CanisterWorm,” in which threat actors steal npm access tokens and weaponize legitimate publisher accounts at scale. The group, tracked as “TeamPCP,” has compromised trusted namespaces including @emilgroup and @teale.io, pushing new SDK…

Crunchyroll Data Breach Allegedly Exposes 100 GB of User Data

A major data breach has reportedly compromised Crunchyroll, the popular Sony-owned anime streaming service. Threat actors claim to have successfully stolen 100 GB of personally identifiable information (PII) from the platform. The breach allegedly took place on March 12, 2026,…

Copyright Complaint Lures Linked to New PureLog Stealer Credential Theft Wave

Threat actors are actively distributing the PureLog Stealer through a sophisticated, multi-stage attack campaign disguised as legal copyright violation notices. This information-stealing malware is engineered to silently harvest sensitive data, including browser credentials, browser extensions, cryptocurrency wallets, and detailed system…