Category: GBHackers

ChatGPT Operator Prompt Injection Exploit Leaks Private Data
18
Feb
2025

ChatGPT Operator Prompt Injection Exploit Leaks Private Data

According to recent findings by cybersecurity researcher Johann Rehberger, OpenAI’s ChatGPT Operator, an experimental agent designed to automate web-based tasks,…

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations
17
Feb
2025

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations

A security researcher recently uncovered a high-risk Insecure Direct Object Reference (IDOR) vulnerability in ExHub, a cloud hosting and collaboration…

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks
17
Feb
2025

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks

Telekom Security has recently uncovered a significant vishing (voice phishing) campaign targeting individuals and organizations across Germany. This operation appears…

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects
17
Feb
2025

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking its first update since 2022. This…

Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB
17
Feb
2025

Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered, exposing enterprise networks to credential theft…

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection
17
Feb
2025

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between initial system compromise and the deployment…

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers
17
Feb
2025

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable remote code execution (RCE). These attacks…

Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries
17
Feb
2025

Threat Actors Exploiting Modified SharpHide Tool to Conceal Registry Entries

Threat actors are leveraging a modified version of the SharpHide tool to create hidden registry entries, significantly complicating detection and…

CISA Warns of Active Exploitation of Apple iOS Security Flaw
17
Feb
2025

CISA Warns of Active Exploitation of Apple iOS Security Flaw

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of active exploitation of a critical security…

Indian Post Office Portal Leak Exposes Thousands of KYC Records
17
Feb
2025

Indian Post Office Portal Leak Exposes Thousands of KYC Records

The Indian Post Office portal recently exposed the sensitive Know Your Customer (KYC) data of thousands of users due to…

Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues
17
Feb
2025

Linux Kernel 6.14 rc3 Released With The Fixes for Critical Issues

Linus Torvalds has announced the release of Linux Kernel 6.14-rc3, marking a critical milestone in stabilizing the upcoming 6.14 kernel…

Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild
14
Feb
2025

Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly being actively exploited by the Chinese…