Category: GBHackers

WinRAR 0‑Day Exploit Listed for $80K on Dark Web Forum
14
Jul
2025

WinRAR 0‑Day Exploit Listed for $80K on Dark Web Forum

A sophisticated zero-day exploit targeting WinRAR, one of the world’s most popular file compression utilities, has surfaced on a dark…

Grok-4 Jailbroken Using Echo Chamber and Crescendo Exploit Combo
14
Jul
2025

Grok-4 Jailbroken Using Echo Chamber and Crescendo Exploit Combo

Security researchers have successfully demonstrated a sophisticated jailbreak attack against Grok-4, X’s advanced AI language model, by combining two powerful…

Fortinet FortiWeb Fabric Connector Flaw Enables Remote Code Execution
13
Jul
2025

Fortinet FortiWeb Fabric Connector Flaw Enables Remote Code Execution

Security researchers have identified a severe pre-authentication SQL injection vulnerability in Fortinet’s FortiWeb Fabric Connector, designated as CVE-2025-25257, that allows…

Researchers Bypass Meta’s Llama Firewall Using Prompt Injection Vulnerabilities
13
Jul
2025

Researchers Bypass Meta’s Llama Firewall Using Prompt Injection Vulnerabilities

Researchers at Trendyol, a leading e-commerce platform, have uncovered multiple vulnerabilities in Meta’s Llama Firewall, a suite of tools designed…

DPC Investigates TikTok Over Transfer of EU User Data to China
13
Jul
2025

DPC Investigates TikTok Over Transfer of EU User Data to China

The Data Protection Commission (DPC) has launched a formal inquiry into TikTok Technology Limited, scrutinizing the company’s practices regarding the…

Network-Based Tool for COM and RPC Exploitation
13
Jul
2025

Network-Based Tool for COM and RPC Exploitation

The need for solutions that improve detection skills against sophisticated attacks is growing in the ever-changing cybersecurity world. COMmander emerges…

Fake Gaming and AI Companies Target Windows and macOS Users with Drainer Malware Attacks
13
Jul
2025

Fake Gaming and AI Companies Target Windows and macOS Users with Drainer Malware Attacks

The cybersecurity company Darktrace has uncovered a persistent, intricate social engineering campaign that targets bitcoin users, building on earlier findings…

Bitcoin Depot Breach Exposes Data of 27,000 Crypto Users
13
Jul
2025

Bitcoin Depot Breach Exposes Data of 27,000 Crypto Users

Bitcoin Depot, Inc., a prominent cryptocurrency ATM operator, has disclosed a data breach that compromised the personal information of approximately…

First-Ever Rowhammer Attack Targeting NVIDIA GPUs
13
Jul
2025

First-Ever Rowhammer Attack Targeting NVIDIA GPUs

Researchers from the University of Toronto have unveiled the first successful Rowhammer attack on an NVIDIA GPU, specifically targeting the…

The Emerging Technique Threat Actors Use to Dominate Targeted Organizations
12
Jul
2025

The Emerging Technique Threat Actors Use to Dominate Targeted Organizations

Threat actors have increasingly adopted ClickFix, a sophisticated social engineering technique that deceives users into executing malicious commands under the…

Thermomix TM5 Vulnerabilities Enable Remote Takeover by Attackers
12
Jul
2025

Thermomix TM5 Vulnerabilities Enable Remote Takeover by Attackers

Researchers have uncovered multiple vulnerabilities in the Thermomix TM5, a multifunctional kitchen appliance from Vorwerk, allowing attackers to potentially achieve…

OpenAI Set to Launch AI-Powered Web Browser in the Coming Weeks
12
Jul
2025

OpenAI Set to Launch AI-Powered Web Browser in the Coming Weeks

OpenAI is on the cusp of introducing a groundbreaking AI-infused web browser, slated for release in the imminent weeks, as…