GB Hacker
-
Multiple TP-Link Omada Vulnerabilities Let Attackers Execute Remote Code
Multiple vulnerabilities have been identified in the TP-Link Omada system, a software-defined networking solution widely used by small to...
-
Microsoft Announced Copilot for Security TI in Defender XDR
Microsoft has announced the general availability of Copilot for Security threat intelligence embedded experience in the Defender XDR portal....
-
WikiLeaks Founder Julian Assange Released in Stunning Deal with U.S.
WikiLeaks founder Julian Assange has been released from prison after reaching a deal with the U.S. government. The agreement, announced...
-
Consulting Companies to Pay $11 Million Failing Cybersecurity Requirements
Two consulting companies, Guidehouse Inc. and Nan McKay and Associates, have agreed to pay $11.3 million to resolve allegations of failing to meet...
-
Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information
A recent rise in data breaches from illegal Chinese OTT platforms exposes that user information, including names and financial details, is...
-
Threat Actors Claiming Breach of Accenture Employee Data
Threat actors have claimed responsibility for a significant data breach involving Accenture, one of the world’s leading consulting firms....
-
Singapore Police Arrested Two Individuals Involved in Hacking Android Devices
The Singapore Police Force (SPF) has arrested two men, aged 26 and 47, for their suspected involvement in malware-enabled scams targeting...
-
Operation Celestial Force Employing Android And Windows Malware To Attack Indian Users
A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage campaign named Operation Celestial Force,...
-
Hidden Backdoor in D-Link Routers Let Attacker Login as Admin
A critical vulnerability has been discovered in several models of D-Link wireless routers, allowing unauthenticated attackers to gain...
-
Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users
Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt services, or...
-
Ascension Hack Caused By an Employee Who Downloaded a Malicious File
Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery efforts following a recent cybersecurity...
-
JetBrains Warns of GitHub Plugin that Exposes Access Tokens
A critical vulnerability (CVE-2024-37051) in the JetBrains GitHub plugin for IntelliJ-based IDEs (2023.1 and later) exposed access tokens to...