GBHackers on Security
Cyber Security News
Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS
Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request Forgery (SSRF) weaknesses.The findings highlight the importance of robust...
Cyber Security News
Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail
Socket’s threat research team has identified a series of malicious npm packages specifically designed to steal private keys from Solana wallets.The implicated packages—@async-mutex/mutex,...
Cyber Security News
Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware
Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking regions, including Hong Kong, Taiwan, and mainland China.These attacks...
Botnet
New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices
Large-scale DDoS attack commands sent from an IoT botnet's C&C server targeting Japan and other countries since late 2024.These commands targeted various companies,...
ChatGPT
Researchers Used ChatGPT to Discover S3 Bucket Takeover Vulnerability in Red Bull
Bug bounty programs have emerged as a critical avenue for researchers to identify vulnerabilities in digital platforms.One such success story involves a recent discovery...
CVE/vulnerability
ChatGPT Crawler Vulnerability Abused to Trigger Reflexive DDoS Attacks
Security researchers have uncovered a severe vulnerability in OpenAI's ChatGPT API, allowing attackers to exploit its architecture for launching Reflective Distributed Denial of Service...
Apple
Apple Confirms Removal of TikTok App US Users
Apple has confirmed that popular apps developed by ByteDance Ltd., including TikTok, will no longer be available for download or updates in the United...
Cyber Security News
Pumakit – Sophisticated Linux Rootkit That Persist Even After Reboots
Pumakit is a sophisticated rootkit that leverages system call interception to manipulate file and network activity. It ensures persistence through kernel-level embedding that allows...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.