Category: GBHackers

ChatGPT-03 Exploited to Override Critical Shutdown Protocols
26
May
2025

ChatGPT-03 Exploited to Override Critical Shutdown Protocols

OpenAI’s latest and most advanced artificial intelligence model, codenamed “o3,” has sparked alarm in the AI safety community after researchers…

Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers' Data Compromised
26
May
2025

Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers’ Data Compromised

Nova Scotia Power, the largest electricity provider in the province, confirmed on Friday, May 23, 2025, that it has been…

Linux 6.15 Launches with Major Performance and Hardware Upgrades
26
May
2025

Linux 6.15 Launches with Major Performance and Hardware Upgrades

The Linux 6.15 kernel, released on May 25, 2025, marks a pivotal moment in open-source development, introducing several groundbreaking features…

D-Link Routers Exposed by Hard-Coded Telnet Credentials
26
May
2025

D-Link Routers Exposed by Hard-Coded Telnet Credentials

A recently disclosed vulnerability (CVE-2025-46176) exposes critical security flaws in D-Link’s DIR-605L and DIR-816L routers, revealing hardcoded Telnet credentials that…

Privilege Escalation via Network Monitoring Flaws: A Growing Threat
26
May
2025

Privilege Escalation via Network Monitoring Flaws: A Growing Threat

Tenable has released version 6.5.1 of its Network Monitor, a key passive vulnerability scanning solution, to address several high-severity vulnerabilities…

Apache Tomcat RCE Vulnerability Exposed with PoC Released
26
May
2025

Apache Tomcat RCE Vulnerability Exposed with PoC Released

A critical security vulnerability, tracked as CVE-2025-24813, has been discovered in Apache Tomcat, a widely used open-source Java servlet container…

Severe WSO2 SOAP Flaw Allows Unauthorized Password Resets for Any Use
26
May
2025

Severe WSO2 SOAP Flaw Allows Unauthorized Password Resets for Any Use

A newly disclosed vulnerability, CVE-2024-6914, has shocked the enterprise software community, affecting a wide range of WSO2 products. The flaw,…

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware
23
May
2025

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application for managing crypto assets via…

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability
23
May
2025

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile (EPMM) version 12.5.0.0 and earlier….

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000
23
May
2025

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code execution (RCE) access to Burger King…

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets
23
May
2025

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt DNS infrastructure, manipulate Non-Human Identity…

Researchers Uncover Infrastructure and TTPs Behind ALCATRAZ Malware
23
May
2025

Researchers Uncover Infrastructure and TTPs Behind ALCATRAZ Malware

Elastic Security Labs has recently exposed a sophisticated new malware family dubbed DOUBLELOADER, observed in conjunction with the RHADAMANTHYS infostealer….