Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity incident that could cost the company up to $400 million. The breach, revealed in a regulatory filing and confirmed by company officials, stemmed from a sophisticated…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited
Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified Windows 0-day vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. These vulnerabilities, currently exploited in the wild, present significant risks for organizations…
Inside Turla’s Uroboros Infrastructure and Tactics Revealed
In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed to the infamous APT group Turla, uncovers a chilling display of sophistication and mastery over Windows kernel internals. With the sample identified by the MD5 hash…
CISA Alerts on Active Exploitation of Zero-Day Vulnerability in Multiple Fortinet Products
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding five zero-day vulnerabilities affecting multiple Fortinet products, after evidence emerged of active exploitation in the wild. The vulnerabilities, tracked as CVE-2025-32756, impact Fortinet’s FortiVoice, FortiMail, FortiNDR,…
Record-Breaking $27 Billion Black Market ‘Haowang Guarantee’ Deals Conducted Behind Closed Doors
Major victory against online crime, two of the world’s largest illicit marketplaces-Huione Guarantee (also known as “Haowang Guarantee”) and Xinbi Guarantee-were forced offline on May 13, 2025. These platforms collectively enabled over $35 billion in transactions, mostly in the stablecoin…
Threat Actors Exploit Open Source Packages to Deploy Malware in Supply Chain Attacks
The Socket Threat Research Team has uncovered a surge in supply chain attacks where threat actors weaponize open source software libraries to deliver malicious payloads such as infostealers, remote shells, and cryptocurrency drainers. With modern development heavily reliant on ecosystems…
Hackers Exploit Google Services to Send Malicious Law Enforcement Requests
Cybersecurity researchers have uncovered a sophisticated phishing campaign where malicious actors exploit Google services to dispatch fraudulent law enforcement requests. This audacious scheme leverages the trust associated with Google’s infrastructure, specifically Google Forms and Google Drive, to craft and distribute…
Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions
The vulnerability management market is projected to reach US$24.08 billion by 2030, with numerous vendors offering seemingly different solutions to the same problem. How does an organization choose the right vulnerability management tool for its needs? Today, we compare three…
Hackers Steal Customers Banking Details in Nova Scotia Cyber Attack
Nova Scotia Power has confirmed that hackers infiltrated its IT infrastructure and exfiltrated sensitive customer data, including banking details from pre-authorized payment systems, in a cyberattack first detected on March 19, 2025. The energy provider revealed on May 14 that…
Microsoft Outlook Down – Millions of Business & Personal Users Worldwide Impacted
A major outage hit Microsoft Outlook and other Microsoft 365 services on Thursday, May 15, 2025, leaving millions of users around the globe unable to access their email, calendars, and other essential productivity tools. The disruption began in the evening…