Category: GBHackers

LibreOffice Vulnerabilities Allow Attackers to Write to Files and Extract Data
18
Feb
2025

LibreOffice Vulnerabilities Allow Attackers to Write to Files and Extract Data

Two critical vulnerabilities in LibreOffice (CVE-2024-12425 and CVE-2024-12426) expose millions of users to file system manipulation and sensitive data extraction…

Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit
18
Feb
2025

Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit

Cybersecurity researchers have uncovered a novel phishing campaign distributing the notorious Tycoon 2FA phishing kit through fraudulent timesheet notification emails,…

BitConnect Scam Exposed as Indian Authorities Seize Illicit Gains
18
Feb
2025

BitConnect Scam Exposed as Indian Authorities Seize Illicit Gains

The Directorate of Enforcement (ED) in Ahmedabad has dealt a significant blow to one of history’s largest cryptocurrency frauds, recovering Rs….

Black-Hat SEO Poisioning Attacks Exploit Indian Government and Financial Websites
18
Feb
2025

Black-Hat SEO Poisioning Attacks Exploit Indian Government and Financial Websites

A sophisticated black-hat SEO poisoning campaign has compromised over 150 Indian government websites and financial institutions, redirecting millions of users…

WinRAR 7.10 Latest Version Released
18
Feb
2025

WinRAR 7.10 Latest Version Released

The popular file compression and archiving tool, WinRAR 7.10, has released with new features, interface enhancements, and improved performance. WinRAR…

Juniper Issues Warning About Critical Authentication Bypass Vulnerability
18
Feb
2025

Juniper Issues Warning About Critical Authentication Bypass Vulnerability

Juniper Networks has issued an urgent security bulletin for its Session Smart Router, Session Smart Conductor, and WAN Assurance Router…

Microsoft Text Services Framework Exploited for Stealthy Persistence
18
Feb
2025

Microsoft Text Services Framework Exploited for Stealthy Persistence

A novel persistence mechanism exploiting Microsoft’s Text Services Framework (TSF) has been uncovered by researchers at Praetorian Labs, revealing a…

ChatGPT Operator Prompt Injection Exploit Leaks Private Data
18
Feb
2025

ChatGPT Operator Prompt Injection Exploit Leaks Private Data

According to recent findings by cybersecurity researcher Johann Rehberger, OpenAI’s ChatGPT Operator, an experimental agent designed to automate web-based tasks,…

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations
17
Feb
2025

IDOR Vulnerability in ExHub Allows Attackers to Alter Hosting Configurations

A security researcher recently uncovered a high-risk Insecure Direct Object Reference (IDOR) vulnerability in ExHub, a cloud hosting and collaboration…

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks
17
Feb
2025

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks

Telekom Security has recently uncovered a significant vishing (voice phishing) campaign targeting individuals and organizations across Germany. This operation appears…

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects
17
Feb
2025

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking its first update since 2022. This…

Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB
17
Feb
2025

Xerox Printer Vulnerability Exposes Authentication Data via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered, exposing enterprise networks to credential theft…