GB Hacker
-
Wireshark 4.0.7 Released – What’s New!
Wireshark, One of the world’s most popular network packet analyzers, released Wireshark 4.0.7 with bug fixes, updated protocol support, and...
-
Elon Musk Launches AI Startup Focus on Understanding Reality
Elon Musk publicly announced the establishment of xAI, a startup that aims at exploring “the true nature of the universe” and will also compete...
-
Re-released Apple WebKit Zero-Day Patch Fixes Website Breaking
Apple has recently released new Rapid Security Response (RSR) patches to fix a zero-day vulnerability. This vulnerability has been exploited in...
-
OWASP ZAP 2.13.0 Released – What’s New!
The OWASP Zed Attack Proxy is a widely used tool for conducting web application penetration testing. It is free and open-source. ZAP functions as...
-
Hackers Leverage USB Flash Drives to Attack Public and Private Sectors Globally
During the initial half of 2023, a notable surge occurred in attacks exploiting infected USB drives for secret theft. While the USB-based...
-
Top 7 Best IP Geolocation APIs For Cybersecurity – 2023
IP geolocation API services can do far more than serve website visitors in their local language and currency using IP lookup. They can also play a...
-
OpenAI Has Made The GPT-4 API Available To Everyone
GPT-4, OpenAI’s newest text-generation model, is now generally available through its API. As part of its upgrade, the company also made GPT 3.5,...
-
Hackers use Rekoobe Backdoor to Attack Linux Systems
Rekoobe is a notorious backdoor that primarily targets Linux environments, and it’s actively exploited by the threat actors, mainly a Chinese...
-
Legion Tool Steals PUBG Players’ Browser Passwords through a Fake GitHub Repo
“The Legion” is a Python-based software that has been crafted with the explicit intention of gathering credentials. Its propagation initially...
-
Update Now! Apple Issues an Emergency Patch to Address a Zero-Day Flaw in iOS and macOS
New Rapid Security Response (RSR) patches from Apple have been released to address a new zero-day defect that has been used in attacks and affects...
-
New Crypto Phishing Attack Steals Funds from Cold Wallets
Cryptocurrency’s rising fame and diverse storage methods expand the arsenal of tools used by threat actors chasing digital assets and funds. The...
-
EdgeRouter and AirCube miniupnpd Vulnerabilities Enable Attackers to Execute Arbitrary Code
AirCube is a wireless access point device used in homes and Edge Routers are special routers manufactured by Ubiquiti that act at the network...