Amazon announced that it will discontinue the local voice processing feature for its AI assistant Alexa. This change, set to take effect on March 28, means that all voice commands will be processed in the cloud instead of on the…
Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Cloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum Attacks
Cloudflare has announced the implementation of post-quantum cryptography across its services. This advancement is part of a broader effort to protect customers from potential quantum attacks that could compromise conventional cryptographic systems in the future. Quantum computers, which are rapidly…
Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure
A critical cybersecurity alert has been issued following the active exploitation of a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. According to the Veriti report, the vulnerability, identified as CVE-2024-27564, has been weaponized by attackers in real-world attacks,…
TruffleHog: New Burp Suite Extension for Secret Scanning Released
A new extension for Burp Suite has been released, integrating the powerful secret scanning capabilities of TruffleHog. This innovative integration aims to enhance the detection of live, exploitable credentials within HTTP traffic, making it a valuable tool for security professionals.…
Top 10 Best Penetration Testing Companies in 2025
Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations by identifying vulnerabilities in their systems, applications, and networks. These firms simulate real-world cyberattacks to uncover weaknesses that could be exploited by malicious actors, helping businesses…
Crypto Platform OKX Suspends Tool Abused by North Korean Hackers
Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator tool. This decision comes on the heels of coordinated attacks by certain media outlets and unsuccessful attempts by the notorious Lazarus Group—a hacking entity linked to…
Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams
Cobalt Strike, a highly advanced threat emulation tool, has released version 4.11, packing a robust suite of features designed to enhance evasion capabilities for red teams. This latest update introduces several novel technologies and improvements, solidifying Cobalt Strike’s position as…
PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability
A proof-of-concept (PoC) exploit has been released for a use-after-free vulnerability in the Linux kernel, identified as CVE-2024-36904. This vulnerability is located in the TCP subsystem of the Linux kernel and is caused by the inet_twsk_hashdance() function inserting the time-wait socket into…
Denmark Issues Warning on Major Cyber Attacks Targeting Telecom Sector
Denmark has announced a heightened alert status for the telecommunications sector due to an increased threat from cyber attacks. According to a recent threat assessment by the Danish Agency for Social Security, the risk level for cyber espionage against the…
Google Launches Open-Source OSV-Scanner for Detecting Security Vulnerabilities
Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability scanning and remediation across various software ecosystems. This update follows the recent release of OSV-SCALIBR, another powerful tool in the OSV suite, which together form a comprehensive…