GB Hacker
-
ChatGPT Disables the Browsing Feature as it Bypasses Paywalls on Websites
OpenAI recently disabled ChatGPT’s Bing browsing due to user discovery of its paywall-bypassing potential, commonly employed by news outlets to...
-
Firefox, ESR, and Thunderbird Memory Safety Bugs Could Allow Unauthorized Code Execution
Firefox has released patches for some of its high and moderate vulnerabilities in Firefox, ESR (Extended Support Release), and Thunderbird...
-
How to Boost Cybersecurity in Your E-commerce Business
Being a business owner has unquestionably many perks. However, there are plenty of hazards as well. Criminals often target businesses of all sizes...
-
Mediatek Security Flaws Affecting Smartphones, Tablets, Wi-Fi, and Other Chipsets
The July 2023 Product Security Bulletin from Taiwanese chipmaker MediaTek describes security flaws impacting MediaTek chipsets for smartphones,...
-
Over 300,000+ Fortinet Firewalls are Vulnerable to a Critical RCE Flaw
The latest research shows Fortigate firewalls are vulnerable to remote code execution attempts. 490,000 affected SSL VPN interfaces are exposed on...
-
Hackers Use HTML Smuggling Technique to Attack European Government Entities
Over recent months, CPR (Check Point Research) monitored a Chinese threat actor attacking European Foreign Affairs ministries and embassies. Check...
-
ChatGPT Creator Sued for $3 Billion Over Theft of Private Data
In a class action complaint filed on Wednesday, it is claimed that OpenAI and Microsoft stole “vast amounts of private information” from internet...
-
Hackers use Cloned pages of Popular Tools to Deliver Blackcat Ransomware
The cybersecurity researchers at Trend Micro recently identified that the Blackcat Ransomware (aka ALPHV) actors are using malvertising tricks to...
-
Snappy – A New Tool to Detect Fake WiFi Access Points
A new tool named “Snappy” developed by cybersecurity experts, can assist in identifying rogue WiFi access points that aim to steal data from users...
-
Submarine Cable Growing Popularity Intensifying Cyber Attacks
Submarine cables installed on the ocean floor facilitate the transmission of data and voice between land-based stations. International...
-
Chinese Spy Balloon Used American Tech to Collect Photos & other Information
Recently, the Wall Street Journal reported that in the early months of this year, a Chinese spy balloon utilized American technology to...
-
MITRE Releases Top 25 Most Dangerous Software Weaknesses
The top 25 most dangerous software weaknesses impacting software for the previous two calendar years have been published by MITRE as part of the...