Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Researchers Hijack Hacker Domain Using Name Server Delegation

Security researchers from Infoblox have successfully intercepted millions of malicious push notification advertisements by exploiting a DNS misconfiguration technique known as “lame nameserver delegation,” gaining complete visibility into a large-scale affiliate advertising operation without directly compromising any systems. The researchers…

New “BodySnatcher” Flaw Allows Full ServiceNow User Impersonation

Security researcher has disclosed a critical vulnerability in ServiceNow’s Virtual Agent API and Now Assist AI Agents application, tracked as CVE-2025-12420. Dubbed “BodySnatcher,” this flaw enables unauthenticated attackers to impersonate any ServiceNow user using only their email address, bypassing multi-factor…

GhostPoster Malware Targets Chrome Users via 17 Rogue Extensions

A sophisticated malware campaign has compromised users of Chrome, Firefox, and Edge by deploying 17 malicious extensions that employ advanced steganography techniques to evade detection. Collectively downloaded more than 840,000 times, the GhostPoster operation represents one of the most technically…

Windows 11 January Update Sparks Widespread Shutdown Complaints

Microsoft’s latest security update for Windows 11 has triggered an unexpected problem affecting enterprise users: PCs equipped with Secure Launch are unable to shut down or hibernate properly. Instead of powering off, affected devices restart automatically, disrupting workflows and forcing…

Best Security Awareness Training Platforms For 2026

Security awareness training platforms empower organizations to combat rising cyber threats by educating employees on phishing, ransomware, and social engineering in 2026. These top 10 solutions deliver simulated attacks, personalized learning, and measurable risk reduction for businesses seeking robust human…

NSA Publishes New Guidelines for Implementing a Zero Trust Security Model

The National Security Agency has published the first two products in its Zero Trust Implementation Guidelines series, offering organizations practical recommendations for adopting Zero Trust security models.   These foundational resources represent a significant step toward strengthening the cybersecurity posture of federal and private-sector entities. …

AWS Console Supply Chain Breach Enables GitHub Repository Hijacking

A newly reported supply chain attack targeting the Amazon Web Services (AWS) management console has raised alarms across the developer community.   Cybersecurity researchers have discovered that threat actors are exploiting misconfigured AWS credentials and integrated GitHub actions to hijack repositories and inject…