GB Hacker
-
Hackers Exploit WordPress Plugin to Steal Credit Card Data
Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting WooCommerce online stores to steal...
-
Operation SpecTor: Authorities Seized Dark Markets Offering Illicit Goods
Law enforcement agencies have successfully dismantled several dark web marketplaces offering illicit goods. Dubbed “Operation SpecTor,”...
-
Microsoft Replacing VBScript With JavaScript & PowerShell
Microsoft has shifted its scripting options for web development and task automation. The company is replacing VBScript with more advanced...
-
Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code
The widely used team workspace corporate wiki Confluence has been discovered to have a critical remote code execution vulnerability. This...
-
PoC Exploit Released for QNAP QTS zero-day RCE Flaw
Researchers have shown a proof-of-concept (PoC) attack for a zero-day remote code execution (RCE) flaw in the QTS operating system from QNAP....
-
Sonicwall SSL-VPN exploit Advertised on the Dark web
The dark web has seen the release of a new vulnerability that targets SonicWALL SSL-VPN devices. Recently, the exploit, which lets people...
-
Russian APT Hackers Attacking Critical Infrastructure
Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated cybercriminals to achieve its strategic...
-
PoC Exploit Released For D-LINK RCE Zero-Day Vulnerability
Two critical vulnerabilities have been discovered in D-Link DIR-X4860 routers which were associated with Authentication bypass due to HNAP port...
-
Tor Browser 13.0.15 Released: What’s New!
Tor Project has announced the release of Tor Browser 13.0.15. Available now on the Tor Browser download page and through their distribution...
-
GPT-4o Released: Faster Model Available for Free to All Users
OpenAI, the top lab for researching artificial intelligence, just released GPT-4o, its newest advance in AI technology. In the field of...
-
Hackers Exploiting Vulnerabilities 50% Faster, Within 4.76 Days
Cybersecurity researchers are sounding the alarm that hackers are exploiting software vulnerabilities faster than ever before. A new report...
-
Google Chrome Zero-day Exploited in the Wild, Patch Now
Google has urgently updated its Chrome browser across all platforms after a critical vulnerability, identified as CVE-2024-4671, was found being...