Category: GBHackers

Exploiting Samsung Vulnerability
22
May
2023

CISA Warns that Hackers Actively Exploiting Samsung Vulnerability

CISA has issued a recent warning regarding a security flaw that impacts Samsung devices, enabling attackers to circumvent Android’s address…

IT Guy Jailed ddos
22
May
2023

Russian IT Guy Jailed for DDoSing Government Websites

According to reports from the FSB (Federal Security Service) Department’s Press Service in Rostov Region, Yevgeny Kotikov, an IT specialist,…

ChatGPT to Deploy Malware
22
May
2023

Hackers Using AI Tools Like ChatGPT to Deploy Malware

Malicious ad campaigns with themes connected to artificial intelligence (AI) tools like Midjourney and ChatGPT have been seen in Google’s…

SIM Swapping Technique
21
May
2023

New Tool to Defend Against ChatGPT Data Leaks

ExtraHop released a new tool called “Reveal(x)” that helps organizations understand their potential risk exposure from employee use of OpenAI…

Keeper Password Vulnerability
20
May
2023

SIM Swapping Technique to Gain Access to Azure Machines

Researchers uncovered a financially motivated threat group known as ‘UNC3944’ which employs phishing and SIM-swapping techniques to seize control of…

Keeper Password Vulnerability
20
May
2023

KeePass Password Vulnerability Let Hackers Gain Master Password

KeePass, a widely used password manager application, is vulnerable to a security flaw that gives the threat actors ability to…

Keeper Password Vulnerability
19
May
2023

Keeper Password Vulnerability Let Hackers Gain Master Password

KeePass, a widely used password manager application, is vulnerable to a security flaw that gives the threat actors ability to…

Cisco Switch Vulnerabilities
19
May
2023

Critical Cisco Switch Vulnerabilities Allow Remote Exploitation

The web-based user interface of some Cisco Small Business Series Switches contains multiple vulnerabilities, according to a warning from Cisco….

researchers Uncovered QakBot Malware
18
May
2023

Researchers Uncovered QakBot Malware C2 Infrastructure

Tam Cymru researchers have recently revealed noteworthy patterns and irregularities from their continuous monitoring of QakBot’s command and control infrastructure. …

Google
18
May
2023

New Android & Google Device Vulnerability Reward Program

Google’s Device Vulnerability Reward Program helps the company identify security flaws in its operating system and devices. To promote additional…

Apple Blocked
18
May
2023

Apple Blocked Over $2 Billion in Fraudulent Transactions

Apple published a report claiming that they prevented around $2 billion of potentially fraudulent transactions in 2022 and rejected around…

Facebook Paid Blue Tick
17
May
2023

Facebook & Instagram Begun Rolling Out Paid Blue Tick

Meta is introducing Meta Verified on Facebook and Instagram. The popular social networking platform will now permit anyone who agrees…