Category: GBHackers

17
Dec
2024

Kali Linux 2024.4 Released – What’s New!

Kali Linux has unveiled its final release for 2024, version Kali Linux 2024.4, packed with notable updates, including new tools…

ConnectOnCall Data Breach, 900,000 Customers Data Exposed
17
Dec
2024

ConnectOnCall Data Breach, 900,000 Customers Data Exposed

 The healthcare communication platform ConnectOnCall, operated by ConnectOnCall.com, LLC, has confirmed a significant data breach that compromised the personal information…

Hitachi Authentication bypass Vulnerability Allows Attackers to Hack the System Remotely
17
Dec
2024

Hitachi Authentication bypass Vulnerability Allows Attackers to Hack the System Remotely

Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer. A severe vulnerability has been discovered…

CISA Warns of Adobe & Windows Kernel Driver Exploited in Attacks
17
Dec
2024

CISA Warns of Adobe & Windows Kernel Driver Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two significant vulnerabilities to its Known Exploited…

New Research Uncovered Dark Internet Service Providers Used For Hacking
16
Dec
2024

New Research Uncovered Dark Internet Service Providers Used For Hacking

Bulletproof hosting services, a type of dark internet service provider, offer infrastructure to cybercriminals, facilitating malicious activities like malware distribution,…

New Android Banking Malware Attacking Indian Banks To Steal Login Credentials
16
Dec
2024

New Android Banking Malware Attacking Indian Banks To Steal Login Credentials

Researchers have discovered a new Android banking trojan targeting Indian users, and this malware disguises itself as essential utility services…

Over-The-Air Attack, Reyee OS IoT Devices Hacked Without Wi-Fi Logins
16
Dec
2024

Over-The-Air Attack, Reyee OS IoT Devices Hacked Without Wi-Fi Logins

Researchers discovered multiple vulnerabilities in Ruijie Networks’ cloud-connected devices. By exploiting these vulnerabilities, attackers can remotely compromise access points, gain…

The Rise of AI-Generated Professional Headshots
16
Dec
2024

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which spans platforms like LinkedIn, corporate websites,…

Over 300,000 Prometheus Servers Vulnerable to DoS Attacks
16
Dec
2024

Over 300,000 Prometheus Servers Vulnerable to DoS Attacks

The research identified vulnerabilities in Prometheus, including information disclosure from exposed servers, DoS risks from pprof endpoints, and potential code…

Password Era is Ending Microsoft to Delete 1 Billion Passwords
16
Dec
2024

Password Era is Ending Microsoft to Delete 1 Billion Passwords

Microsoft has announced that it is currently blocking an astounding 7,000 password attacks every second, nearly double the rate from…

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls
16
Dec
2024

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in Israel and the US, have been…

Hackers Abuse Google Ads To Attacking Graphic Design Professionals
16
Dec
2024

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals, as the actor has launched at…