Security researchers have uncovered a severe vulnerability in OpenAI’s ChatGPT API, allowing attackers to exploit its architecture for launching Reflective Distributed Denial of Service (DDoS) attacks. This loophole, characterized by a high severity CVSS score of 8.6, raises significant concerns…
Tag: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Apple Confirms Removal of TikTok App US Users
Apple has confirmed that popular apps developed by ByteDance Ltd., including TikTok, will no longer be available for download or updates in the United States. This decision, effective January 19, 2025, comes in response to the Protecting Americans from Foreign…
Threat Actor IntelBroker Allegedly Claiming Breach of Hewlett Packard Enterprise Data
A threat actor known as IntelBroker has taken to a prominent dark web forum to claim a significant data breach at Hewlett Packard Enterprise (HPE). The alleged breach reportedly includes a vast array of sensitive information, raising concerns about the…
FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December
FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how threat actor strategies are constantly evolving. The analysis reveals that artificial intelligence has limited sophistication, even though it enables rapid operations scaling and the generation of…
Pumakit – Sophisticated Linux Rootkit That Persist Even After Reboots
Pumakit is a sophisticated rootkit that leverages system call interception to manipulate file and network activity. It ensures persistence through kernel-level embedding that allows for continued operation after reboots. By tampering with logs and employing anti-detection techniques that include disabling…
Massive NBI Data Breach Exposes Millions of Users Records Online
The National Bureau of Investigation (NBI), the Philippines’ top investigative agency, has reportedly been compromised, exposing the sensitive data of millions of Filipinos. A dark web user operating under the pseudonym “Zodiac Killer” has taken responsibility for the attack, claiming…
Researchers Accessed Windows BitLocker Encrypted Files Disassembling the Laptop
Cybersecurity researchers have uncovered a major flaw in the Windows BitLocker encryption system, allowing attackers to access encrypted data without requiring physical disassembly of the target laptop. The exploit, named “bitpixie”, demonstrates how attackers can extract the disk encryption key, bypassing…
Rhino Linux 2025.1 Released – Update Now!
Rhino Linux is roaring into the new year with the exciting release of Rhino Linux 2025.1! After a brief pause to refine the system, this latest snapshot introduces an array of updates and improvements, solidifying Rhino Linux as a reliable and…
PoC Exploit Released for QNAP RCE Vulnerability
A critical remote code execution (RCE) vulnerability, tracked as CVE-2024-53691, has recently come to light, affecting users of QNAP’s QTS and QuTS Hero operating systems. This vulnerability enables remote attackers with user access privileges to traverse the file system and…
Multiple HPE Aruba Network Vulnerabilities Allows Remote Arbitrary Code Execution
Hewlett Packard Enterprise (HPE) has confirmed multiple vulnerabilities in its Aruba Networking products that could allow remote arbitrary code execution. These vulnerabilities, CVE-2025-23051 and CVE-2025-23052, affect various versions of the AOS-8 and AOS-10 Operating Systems, specifically impacting Mobility Conductors, Controllers,…