GB Hacker
-
Cisco Switch Flaw Let Attack Reads Encrypted Traffic
The Cisco ACI Multi-Site CloudSec encryption feature of the Cisco Nexus 9000 Series switches contains a critical flaw that enables attackers to...
-
TeamsPhisher Tool Exploits Microsoft Teams Flaw to Send Malware to Users
US Navy, one of the red team members, recently released “TeamsPhisher,” a tool that exploits the Microsoft Teams’ security flaw that is not fixed...
-
ChatGPT Disables the Browsing Feature as it Bypasses Paywalls on Websites
OpenAI recently disabled ChatGPT’s Bing browsing due to user discovery of its paywall-bypassing potential, commonly employed by news outlets to...
-
Firefox, ESR, and Thunderbird Memory Safety Bugs Could Allow Unauthorized Code Execution
Firefox has released patches for some of its high and moderate vulnerabilities in Firefox, ESR (Extended Support Release), and Thunderbird...
-
How to Boost Cybersecurity in Your E-commerce Business
Being a business owner has unquestionably many perks. However, there are plenty of hazards as well. Criminals often target businesses of all sizes...
-
Mediatek Security Flaws Affecting Smartphones, Tablets, Wi-Fi, and Other Chipsets
The July 2023 Product Security Bulletin from Taiwanese chipmaker MediaTek describes security flaws impacting MediaTek chipsets for smartphones,...
-
Over 300,000+ Fortinet Firewalls are Vulnerable to a Critical RCE Flaw
The latest research shows Fortigate firewalls are vulnerable to remote code execution attempts. 490,000 affected SSL VPN interfaces are exposed on...
-
Hackers Use HTML Smuggling Technique to Attack European Government Entities
Over recent months, CPR (Check Point Research) monitored a Chinese threat actor attacking European Foreign Affairs ministries and embassies. Check...
-
ChatGPT Creator Sued for $3 Billion Over Theft of Private Data
In a class action complaint filed on Wednesday, it is claimed that OpenAI and Microsoft stole “vast amounts of private information” from internet...
-
Hackers use Cloned pages of Popular Tools to Deliver Blackcat Ransomware
The cybersecurity researchers at Trend Micro recently identified that the Blackcat Ransomware (aka ALPHV) actors are using malvertising tricks to...
-
Snappy – A New Tool to Detect Fake WiFi Access Points
A new tool named “Snappy” developed by cybersecurity experts, can assist in identifying rogue WiFi access points that aim to steal data from users...
-
Submarine Cable Growing Popularity Intensifying Cyber Attacks
Submarine cables installed on the ocean floor facilitate the transmission of data and voice between land-based stations. International...