Category: GBHackers

Deloitte UK Hacked - Brain Cipher Group Claim to Have Stolen 1 TB of Data
05
Dec
2024

Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data

Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte of sensitive data. Emerging in June…

Cisco NX-OS Flaw Let Attackers Bypass Image Signature Verification
05
Dec
2024

Cisco NX-OS Flaw Let Attackers Bypass Image Signature Verification

A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially allowing attackers to bypass image signature…

ChatGPT Next Web vulnerability Let Attackers exploit endpoint to Perform SSRF
05
Dec
2024

ChatGPT Next Web vulnerability Let Attackers exploit endpoint to Perform SSRF

Researchers released a detailed report on a significant security vulnerability named CVE-2023-49785, affecting the ChatGPT Next Web, popularly known as…

I-O DATA Routers Command Injection Vulnerabilities Actively Exploited in Attacks
05
Dec
2024

I-O DATA Routers Command Injection Vulnerabilities Actively Exploited in Attacks

I-O DATA DEVICE, INC. has announced that several critical vulnerabilities in their UD-LT1 and UD-LT1/EX routers are being actively exploited….

Thinkware Cloud APK Vulnerability Allows Code Execution With Elevated Privileges
05
Dec
2024

Thinkware Cloud APK Vulnerability Allows Code Execution With Elevated Privileges

A critical vulnerability identified as CVE-2024–53614 has been discovered in the Thinkware Cloud APK version 4.3.46. This vulnerability arises from…

Fuji Electric Indonesia Hit by Ransomware Attack
05
Dec
2024

Fuji Electric Indonesia Hit by Ransomware Attack

Fuji Electric Indonesia has fallen victim to a ransomware attack, impacting its operations and raising concerns about data security and…

HackSynth An Autonomous Penetration Testing Framework For Simulating Cyber-Attacks
05
Dec
2024

HackSynth An Autonomous Penetration Testing Framework For Simulating Cyber-Attacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to solve Capture The Flag (CTF) challenges…

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags
05
Dec
2024

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL Launch has emerged, allowing users to…

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild
05
Dec
2024

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being actively exploited in the wild. The…

New TLDs Such as .shop, .top and .xyz Leveraged by Phishers
04
Dec
2024

New TLDs Such as .shop, .top and .xyz Leveraged by Phishers

Phishing attacks have surged nearly 40% in the year ending August 2024, with a significant portion of this increase linked…

Google Chrome Security Update, Patch for High-severity Vulnerability
04
Dec
2024

Google Chrome Security Update, Patch for High-severity Vulnerability

Google has released a significant security update for its Chrome browser, aiming to address several vulnerabilities and enhance user safety….

Progress WhatsUp Gold RCE Vulnerability
04
Dec
2024

Progress WhatsUp Gold RCE Vulnerability

A registry overwrite remote code execution (RCE) vulnerability has been identified in NmAPI.exe, part of the WhatsUp Gold network monitoring…