Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Salesforce Confirms Customer Data Was Exposed in Gainsight Breach

Salesforce has identified unusual activity involving applications published by Gainsight that are connected to the Salesforce platform. The company’s investigation revealed that this suspicious activity resulted in unauthorized access to specific customer data stored in Salesforce environments. Upon discovery, Salesforce…

Operation DreamJob Attacks on Manufacturing via WhatsApp Web

Operation DreamJob, a longstanding North Korean cyberespionage campaign, has once again demonstrated its lethal effectiveness by targeting manufacturing organizations through deceptive job-related messages delivered via WhatsApp Web. In August 2025, Orange Cyberdefense’s CyberSOC and CSIRT investigated an intrusion targeting an…

Critical Grafana Flaw Lets Attackers Escalate Privileges

Grafana Labs has released critical security patches addressing a severe vulnerability in its SCIM provisioning feature that could allow attackers to escalate privileges or impersonate users. The flaw, tracked as CVE-2025-41115 with a CVSS score of 10.0 (Critical), affects Grafana…

Emerging Ransomware Variants Exploit Amazon S3 Misconfigurations

Ransomware is shifting from traditional systems to cloud environments, fundamentally redefining its impact on cloud-native data. As organizations increasingly migrate to cloud platforms, threat actors are adapting their tactics moving away from traditional encryption-based malware to exploit the unique architecture…

CISA Alerts Users to Active Attacks on Chrome 0-Day Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Google Chrome to its Known Exploited Vulnerabilities (KEV) catalog, warning of active exploitation in the wild. The flaw, tracked as CVE-2025-13223, resides in Google Chromium’s V8 JavaScript…

Samourai Wallet Founders Jailed for $237M Crypto Laundering

The co-founders of Samourai Wallet, a cryptocurrency mixing service that facilitated over $237 million in illegal transactions, have been sentenced to prison following their conviction on money laundering and conspiracy charges. Keonne Rodriguez, 37, the Chief Executive Officer, received a…

The Rise of Hybrid Threat Actors: Digital Meets Physical

The distinction between cyber warfare and traditional military operations is disappearing. Recent investigations by Amazon threat intelligence teams have identified a troubling trend: cyber-enabled kinetic targeting, in which nation-state actors systematically leverage cyber operations to enable and enhance physical military…

The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals

Generative artificial intelligence has fundamentally transformed the landscape of cybercriminal operations by eliminating what was once a critical barrier to entry: the quality of the scam itself. Where scammers previously relied on obvious spelling mistakes, grammatically incorrect text, and amateurish…

Critical Twonky Server Flaws Let Hackers Bypass Login Protection

Twonky Server version 8.5.2 contains two critical authentication bypass vulnerabilities that allow unauthenticated attackers to steal administrator credentials and take complete control of the media server. Security researchers at Rapid7 discovered that an attacker can leak encrypted admin passwords through…

Microsoft Adds Azure Firewall With AI-Powered Security Copilot

Microsoft has integrated Azure Firewall with its AI-powered Security Copilot platform, bringing natural language threat investigation capabilities to cloud network security teams. The new integration allows security analysts to investigate malicious network traffic using conversational prompts instead of complex query…