Category: GBHackers

Pootry EDR Killer Malware Wipes Out Security Tools From Windows Machine
28
Aug
2024

Pootry EDR Killer Malware Wipes Out Security Tools From Windows Machine

Windows drivers can be abused to bypass security measures. Attackers can exploit vulnerabilities in legitimate drivers or use stolen or…

Research Unveils Eight Android And iOS That Leaks Users Sensitive Data
28
Aug
2024

Research Unveils Eight Android And iOS That Leaks Users Sensitive Data

The eight Android and iOS apps fail to adequately protect user data, which transmits sensitive information, such as device details,…

32 Million Sensitive Records Exposed From Service Management Provider
28
Aug
2024

32 Million Sensitive Records Exposed From Service Management Provider

A significant data breach occurred at ServiceBridge, a technology company specializing in field service management. An unsecured database housing a…

TDECU MOVEit Data Breach, 500,000+ Personal Data Exposed
28
Aug
2024

TDECU MOVEit Data Breach, 500,000+ Personal Data Exposed

Texas Dow Employees Credit Union (TDECU) has disclosed that the personal information of over 500,000 members was exposed due to…

Versa Director Zero-day Vulnerability Let Attackers Upload Malicious Files
28
Aug
2024

Versa Director Zero-day Vulnerability Let Attackers Upload Malicious Files

Versa Networks specializes in successful business. It offers Secure Access Service Edge (SASE), consolidating networking and security services in a…

Airtags Locator Device used to Grab the Stolen Parcel
28
Aug
2024

Airtags Locator Device used to Grab the Stolen Parcel

Two suspects have been apprehended for mail theft after being tracked using an AirTag locator device. The incident unfolded on…

Patchwork Actors Using Weaponized Encrypted Zip Files to Attack Orgs
28
Aug
2024

Patchwork Actors Using Weaponized Encrypted Zip Files to Attack Orgs

The cyber espionage group Patchwork, also known by various aliases, has been active since 2009, primarily targeting Asian organizations in…

Researchers Disclosed 20 Vulnerabilities Exploited To Attack ML Used In Orgs
28
Aug
2024

Researchers Disclosed 20 Vulnerabilities Exploited To Attack ML Used In Orgs

The MLOps pipeline automates the machine learning lifecycle, from model training to deployment, which involves defining the pipeline using Python…

Cheana Stealer
28
Aug
2024

Rockwell Automation ThinManager Flaw Let Attackers Execute Remote Code

Rockwell Automation’s ThinManager ThinServer has been found to contain multiple critical vulnerabilities that could allow attackers to execute remote code….

Cheana Stealer
27
Aug
2024

Microsoft 365 Flags Emails with Images as Malware

Microsoft 365 users have reported a troubling issue in which email messages containing images are incorrectly flagged as malware and…

Cheana Stealer
27
Aug
2024

Microsoft Copilot Prompt Injection Vulnerability Let Hackers Exfiltrate Sensitive Data

A security researcher revealed a critical vulnerability in Microsoft Copilot, a tool integrated into Microsoft 365, which allowed hackers to…

Cheana Stealer
27
Aug
2024

News Chrome 0-Day Vulnerability Actively Exploited in the Wild

The Chrome team announced that Chrome 128 has been promoted to the stable channel for Windows, Mac, and Linux. This…