Category: GBHackers

Hackers Can Hijack Your Terminal Via Prompt Injection using LLM-powered Apps
10
Dec
2024

Hackers Can Hijack Your Terminal Via Prompt Injection using LLM-powered Apps

Researchers have uncovered that Large Language Models (LLMs) can generate and manipulate ANSI escape codes, potentially creating new security vulnerabilities…

Google Announces Vanir, A Open-Source Security Patch Validation Tool
09
Dec
2024

Google Announces Vanir, A Open-Source Security Patch Validation Tool

Google has officially launched Vanir, an open-source security patch validation tool designed to streamline and automate the process of ensuring software…

Raspberry Pi 500 & Monitor, Complete Desktop Setup at $190
09
Dec
2024

Raspberry Pi 500 & Monitor, Complete Desktop Setup at $190

Raspberry Pi, a pioneer in affordable and programmable computing, has once again elevated its game with the launch of the Raspberry…

New Transaction-Relay Jamming Vulnerability Let Attackers Exploits Bitcoin Nodes
09
Dec
2024

New Transaction-Relay Jamming Vulnerability Let Attackers Exploits Bitcoin Nodes

A newly disclosed transaction-relay jamming vulnerability has raised concerns about the security of Bitcoin nodes, particularly in the context of…

Qlik Sense for Windows Vulnerability Allows Remote Code Execution
09
Dec
2024

Qlik Sense for Windows Vulnerability Allows Remote Code Execution

Qlik has identified critical vulnerabilities in its Qlik Sense Enterprise for Windows software that could lead to remote code execution…

QNAP High Severity Vulnerabilities Let Remote attackers to Compromise System
09
Dec
2024

QNAP High Severity Vulnerabilities Let Remote attackers to Compromise System

72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…

Healthcare Security Strategies for 2025
09
Dec
2024

Healthcare Security Strategies for 2025

Imagine this: It’s a typical Tuesday morning in a bustling hospital. Doctors make their rounds, nurses attend to patients, and…

Hackers Use Artificial Intelligence to Create Sophisticated Social Engineering Attacks
09
Dec
2024

Hackers Use Artificial Intelligence to Create Sophisticated Social Engineering Attacks

The Federal Bureau of Investigation (FBI) has issued a warning about a growing trend in cybercrime, hackers leveraging generative artificial…

DaMAgeCard Attack - New SD Card Attack Lets Hackers Directly Access System Memory
07
Dec
2024

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed “DaMAgeCard Attack” in the new SD Express card standard that could allow…

Deloitte Denies Breach, Claims Only Single System Affected - GBHackers Security
07
Dec
2024

Deloitte Denies Breach, Claims Only Single System Affected – GBHackers Security

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish the data it had stolen earlier…

Celestial Stealer Attacking Browsers
06
Dec
2024

Sophisticated Celestial Stealer Attacking Browsers To Steal Login Credentials

Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection with obfuscation and anti-analysis techniques, steals…

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication
06
Dec
2024

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to the Pakistani group Storm-0156, which allows…