GB Hacker
-
PoC Exploit Released For D-LINK RCE Zero-Day Vulnerability
Two critical vulnerabilities have been discovered in D-Link DIR-X4860 routers which were associated with Authentication bypass due to HNAP port...
-
Tor Browser 13.0.15 Released: What’s New!
Tor Project has announced the release of Tor Browser 13.0.15. Available now on the Tor Browser download page and through their distribution...
-
GPT-4o Released: Faster Model Available for Free to All Users
OpenAI, the top lab for researching artificial intelligence, just released GPT-4o, its newest advance in AI technology. In the field of...
-
Hackers Exploiting Vulnerabilities 50% Faster, Within 4.76 Days
Cybersecurity researchers are sounding the alarm that hackers are exploiting software vulnerabilities faster than ever before. A new report...
-
Google Chrome Zero-day Exploited in the Wild, Patch Now
Google has urgently updated its Chrome browser across all platforms after a critical vulnerability, identified as CVE-2024-4671, was found being...
-
Bangladesh IT Provider Database Compromise: 95k Email Addresses Leaked
Tappware, a prominent IT service provider, faced a breach when approximately 50GB of its database was leaked on a hacker forum. This...
-
Google Simplifies Two-Factor Authentication Setup Process
Google has announced an update to its two-factor authentication (2FA) process, also known as 2-step Verification (2SV), aimed at simplifying the...
-
Citrix NetScaler ADC & Gateway Flaw Lets Attackers Obtain Sensitive Data Remotely
A security vulnerability has been identified in Citrix NetScaler ADC and Gateway appliances, allowing remote attackers to access sensitive data...
-
Tinyproxy Flaw Let Attackers Execute Remote Code
A security flaw has been identified in Tinyproxy, a lightweight HTTP/HTTPS proxy daemon widely used in small network environments. The...
-
Cisco IP Phone Vulnerability Let Attackers Trigger DoS Attack
Cisco has disclosed multiple vulnerabilities in its IP Phone firmware that could severely impact users by allowing unauthenticated, remote...
-
REvil Ransomware Affiliate Sentenced for 13 Years in Prison
A Ukrainian national, Yaroslav Vasinskyi, has been sentenced to 13 years and seven months in prison. Vasinskyi, known in the cyber...
-
Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy
Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running....