Aggregator
OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia
OpenAI, the organization behind ChatGPT and other advanced AI tools, is making significant strides in its efforts to reduce its dependency on Nvidia by developing its first in-house artificial intelligence chip. According to the source, OpenAI is finalizing the design of its first-generation AI processor, which is expected to be sent for fabrication in the […]
The post OpenAI Developing Its Own Chip to Reduce Reliance on Nvidia appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2025-0588 | Octopus Deploy Octopus Server denial of service
8Base Ransomware Site Seized, Phobos Suspects Arrested in Thailand
Crooks use Google Tag Manager skimmer to steal credit card data from a Magento-based e-stores
I Used a Sandbox to Strengthen Bank’s Security—Here’s How It Worked
Recently we had a chance to sit down for a chat with the Head of Cybersecurity at an investment bank. An hour-long conversation gave a sneak peek into the work of their cybersec team, challenges they face, and the use of ANY.RUN’s Interactive Sandbox. Here’s what we learned. Company and Team Overview We’re an investment […]
The post I Used a Sandbox to Strengthen Bank’s Security—Here’s How It Worked appeared first on ANY.RUN's Cybersecurity Blog.
New York Bans DeepSeek Over Potential Data Risks
New York Governor Kathy Hochul announced that the state has banned the use of the China-based AI startup DeepSeek on government-issued devices and networks. The decision stems from escalating concerns over potential foreign surveillance and censorship risks associated with the app, which has recently gained meteoric popularity. Governor Hochul issued a statement addressing the ban, […]
The post New York Bans DeepSeek Over Potential Data Risks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
苹果释出紧急更新修复 0day
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on February 11, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-319-17 2N Access Commander (Update A)
- ICSA-25-037-04 Trimble Cityworks (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CISA has added four vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-40891 Zyxel DSL CPE OS Command Injection Vulnerability
- CVE-2024-40890 Zyxel DSL CPE OS Command Injection Vulnerability
- CVE-2025-21418 Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability
- CVE-2025-21391 Microsoft Windows Storage Link Following Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions
CVE-2024-13506 | paoltaia GeoDirectory Plugin up to 2.8.97 on WordPress cross site scripting
CVE-2025-0862 | SuperSaaS Plugin up to 2.1.12 on WordPress cross site scripting
Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks
Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks. According to the whoisxmlapi shared on the X, there has been a surge in the registration of Valentine’s Day-themed domains, many of which are likely being used to perpetrate phishing schemes and online fraud. Valentine’s Day is a time when individuals […]
The post Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS
Advanced Persistent Threats (APTs) represent a sophisticated and stealthy category of cyberattacks targeting critical organizations globally. Unlike common malware, APTs employ evasive tactics, techniques, and procedures (TTPs) to remain undetected for extended periods. Their command-and-control (C&C) communications often mimic legitimate web traffic, making detection particularly challenging for traditional Network Intrusion Detection Systems (NIDS). To address […]
The post EARLYCROW: Detecting APT Malware Command and Control Activities Over HTTPS appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.