GB Hacker
-
WhatsApp Now Allow You to Edit Sent Messages
Editing messages is one of the key features that WhatsApp has been missing for a while. Ever since the Facebook takeover in 2014, there have been...
-
BrutePrint – Bruteforce Attack to Bypass User Authentication on Smartphones
A novel assault named ‘BrutePrint’ has been unveiled by the joint efforts of Tencent Labs and Zhejiang University researchers, enabling the...
-
CISA Warns that Hackers Actively Exploiting Samsung Vulnerability
CISA has issued a recent warning regarding a security flaw that impacts Samsung devices, enabling attackers to circumvent Android’s address space...
-
Russian IT Guy Jailed for DDoSing Government Websites
According to reports from the FSB (Federal Security Service) Department’s Press Service in Rostov Region, Yevgeny Kotikov, an IT specialist, was...
-
Hackers Using AI Tools Like ChatGPT to Deploy Malware
Malicious ad campaigns with themes connected to artificial intelligence (AI) tools like Midjourney and ChatGPT have been seen in Google’s search...
-
Reveal(x) – New Tool to Defend Against ChatGPT Data Leaks
ExtraHop released a new tool called “Reveal(x)” that helps organizations understand their potential risk exposure from employee use of OpenAI...
-
Hackers Use SIM Swapping Technique to Gain Access to Microsoft Azure Machines
Researchers uncovered a financially motivated threat group known as ‘UNC3944’ which employs phishing and SIM-swapping techniques to seize control...
-
Critical Cisco Switch Vulnerabilities Allow Remote Exploitation
The web-based user interface of some Cisco Small Business Series Switches contains multiple vulnerabilities, according to a warning from Cisco....
-
Researchers Uncovered Notorious QakBot Malware C2 Infrastructure
Tam Cymru researchers have recently revealed noteworthy patterns and irregularities from their continuous monitoring of QakBot’s command and...
-
New Android & Google Device Vulnerability Reward Program – Rewards of up to $15,000!
Google’s Device Vulnerability Reward Program helps the company identify security flaws in its operating system and devices. To promote additional...
-
Apple Blocked Over $2 Billion in Fraudulent Transactions & 1.7 Malicious Apps
Apple published a report claiming that they prevented around $2 billion of potentially fraudulent transactions in 2022 and rejected around 1.7...
-
Hackers Modified Cobalt Strike Capabilities to Attack macOS Users
Geacon, a Cobalt Strike implementation written in Golang, is likely to attract the attention of threat actors looking for vulnerable macOS...