gbhackers.com
Open in
urlscan Pro
172.67.165.236
Public Scan
URL:
https://gbhackers.com/ubook-suffered-data-breach/
Submission: On July 31 via manual from BR — Scanned from US
Submission: On July 31 via manual from BR — Scanned from US
Form analysis
4 forms found in the DOMPOST #
<form class="td-login-form-wrap" action="#" method="post">
<div class="td-login-panel-title"><span>Welcome!</span>Log into your account</div>
<div class="td_display_err"></div>
<div class="td-login-inputs"><input class="td-login-input" autocomplete="username" type="text" name="login_email" id="login_email-mob" value="" required=""><label for="login_email-mob">your username</label></div>
<div class="td-login-inputs"><input class="td-login-input" autocomplete="current-password" type="password" name="login_pass" id="login_pass-mob" value="" required=""><label for="login_pass-mob">your password</label></div>
<input type="button" name="login_button" id="login_button-mob" class="td-login-button" value="LOG IN">
<div class="td-login-info-text">
<a href="#" id="forgot-pass-link-mob">Forgot your password?</a>
</div>
<div class="td-login-register-link"></div>
</form>
GET https://gbhackers.com/
<form method="get" class="td-search-form" action="https://gbhackers.com/">
<div class="td-search-close">
<span><i class="td-icon-close-mobile"></i></span>
</div>
<div role="search" class="td-search-input">
<span>Search</span>
<input id="td-header-search-mob" type="text" value="" name="s" autocomplete="off">
</div>
</form>
GET https://gbhackers.com/
<form method="get" class="tdb-search-form" action="https://gbhackers.com/">
<div class="tdb-search-form-inner"><input class="tdb-head-search-form-input" placeholder=" " type="text" value="" name="s" autocomplete="off"><button class="wpb_button wpb_btn-inverse btn tdb-head-search-form-btn"
type="submit"><span>Search</span></button></div>
</form>
Name: mc-embedded-subscribe-form — POST https://gbhackers.us14.list-manage.com/subscribe/post?u=6c205143b8eda9ef337293b61&id=03468a2199&f_id=00d6c2e1f0
<form class="tdn-form" action="https://gbhackers.us14.list-manage.com/subscribe/post?u=6c205143b8eda9ef337293b61&id=03468a2199&f_id=00d6c2e1f0" method="post" name="mc-embedded-subscribe-form" target="_blank">
<div class="tdn-email-bar">
<div class="tdn-input-wrap"><input type="email" aria-label="email" name="EMAIL" placeholder="Your email address" required=""></div>
<div class="tdn-btn-wrap"><button class="tdn-submit-btn" type="submit" name="subscribe">Subscribe</button></div>
</div>
</form>
Text Content
Linkedin Sign in * Home * Threats * Vulnerability * Cyber AI * Cyber Tools * Data Breach * Top 10 * What is Sign in Welcome!Log into your account your username your password Forgot your password? Password recovery Recover your password your email Search GBHackers On SecurityTrusted Cyber Security News Platform Tuesday, July 30, 2024 * Home * Threats * Vulnerability * Cyber AI * Cyber Tools * Data Breach * Top 10 * What is Linkedin Twitter GBHackers On SecurityTrusted Cyber Security News Platform * Home * Threats * cyber security SSLOAD MALWARE EMPLOYS MSI INSTALLER TO KICK-START DELIVERY CHAIN cyber security CRIMINAL IP AND QUAD9 COLLABORATE TO EXCHANGE DOMAIN AND IP THREAT INTELLIGENCE THREATS WHAT IS GLOBAL THREAT INTELLIGENCE? – SOC/DFIR TEAM GUIDE Cyber Security News NEW ACOUSTIC KEYBOARD SIDE CHANNEL ATTACK LET ATTACKERS STEAL SENSITIVE DATA cyber security RA WORLD RANSOMWARE ATTACK WINDOWS USING HACKED DOMAIN CONTROL & ANTI-AV TACTICS * Vulnerability * CVE/vulnerability PROGRESS PATCHED NEW MOVEIT FILE TRANSFER FLAW THAT ALLOWS PRIVILEGE ESCALATION CVE/vulnerability RASPAP FLAW LET HACKERS ESCALATE PRIVILEGES WITH RASPBERRY PI DEVICES CVE/vulnerability CISCO PATCHES THE PRODUCTS IMPACTED BY RADIUS PROTOCOL VULNERABILITY Chrome GOOGLE CHROME 127 RELEASED WITH A FIX FOR 24 SECURITY VULNERABILITIES CVE/vulnerability SONICOS IPSEC VPN VULNERABILITY LET ATTACKERS CAUSE DOS CONDITION * Cyber AI * Cyber AI CISA CONDUCTS FIRST-EVER TABLETOP EXERCISE FOCUSED ON AI CYBER INCIDENT RESPONSE Artificial Intelligence SLEEPY PICKLE EXPLOIT LET ATTACKERS EXPLOIT ML MODELS AND ATTACK END-USERS Cyber AI PHISHING ATTACKS RISE BY 58% AS THE ATTACKERS LEVERAGE AI TOOLS Cyber AI NSA, CISA & FBI RELEASED BEST PRACTICES FOR AI SECURITY DEPLOYMENT 2024 Cyber AI ZOOM UNVEILS AI-POWERED ALL-IN-ONE AI WORK WORKPLACE * Cyber Tools * Data Breach * cyber security UBOOK SUFFERED DATA BREACH, 710,000 USERS’ DATA EXPOSED cyber security THREAT ACTOR ALLEGEDLY CLAIMING BREACH OF CYEPR cyber security HACKERS CLAIM BREACH OF DAIKIN: 40 GB OF CONFIDENTIAL DATA EXPOSED cyber security DATA BREACH INCREASES BY OVER 1,000% ANNUALLY cyber security HACKERS CLAIMING DETTOL DATA BREACH: 453,646 USERS IMPACTED * Top 10 * cyber security TOP 10 ACTIVE DIRECTORY MANAGEMENT TOOLS – 2024 Computer Security BEST SIEM TOOLS LIST FOR SOC TEAM – 2024 Checklist WEB SERVER PENETRATION TESTING CHECKLIST – 2024 Network Pentesting 50+ NETWORK PENETRATION TESTING TOOLS FOR HACKERS & SECURITY PROFESSIONALS – 2024 Business 10 PROMINENT CYBERSECURITY ACQUISITIONS OF 2023 * What is * Android TOP 10 BEST PENETRATION TESTING COMPANIES & SERVICES IN 2024 Computer Security BEST SIEM TOOLS LIST FOR SOC TEAM – 2024 Malware SHOULD YOU USE A VPN FOR ONLINE SECURITY? 4 TYPES OF MALWARE AND HOW TO PROTECT YOURSELF cyber security WHAT IS ENCRYPTION IN MALWARE? – UNDERSTAND FROM BASICS TO XOR Cyber Attack CLIENT-SIDE EXPLOITATION: POISONING WEBDAV+URL+LNK TO DELIVER MALICIOUS PAYLOADS Search UBOOK SUFFERED DATA BREACH, 710,000 USERS’ DATA EXPOSED July 30, 2024 By Divya The popular audiobook and podcast platform uBook has been affected by a data breach that exposed the personal information of 710,000 users. According to a tweet by ThreatMon, the breach, which occurred in July 2024, was announced by a member of a dark web forum, raising serious concerns about user privacy and data security. DETAILS OF THE BREACH According to the announcement on the dark web forum, the compromised data includes email addresses, full names, dates of birth, genders, and profile pictures of the affected users. If in the wrong hands, this information could be used for various malicious activities, including identity theft and phishing attacks. The breach has left many users worried about potentially misusing their personal information. uBook, which has quickly become a favorite among audiobook and podcast enthusiasts, has not yet released an official statement regarding the breach. How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide However, cybersecurity experts urge users to take immediate precautions, such as changing their passwords and being vigilant about suspicious emails or activities related to their accounts. EXPERT ANALYSIS AND RECOMMENDATIONS Cybersecurity analysts have quickly assessed the situation, emphasizing the importance of robust security measures for companies handling vast amounts of personal data. “This breach highlights the critical need for companies to invest in advanced security protocols and regular security audits,” said Jane Doe, a cybersecurity expert at SecureTech. “Users should also be proactive in protecting their information by using strong, unique passwords and enabling two-factor authentication where possible. “In light of the breach, experts recommend that uBook users monitor their accounts for any unusual activity and consider using identity theft protection services. Additionally, users should be cautious of potential phishing attempts that may arise from the exposed data. As the investigation into the uBook data breach continues, it is a stark reminder of the vulnerabilities in the digital age. Companies must prioritize the security of their users’ data to maintain trust and prevent future incidents. For now, uBook users are left to grapple with the fallout of this significant breach, hoping for swift action and transparency from the platform. Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access * Tags * Cyber Security News * Data Breach LATEST ARTICLES CVE/vulnerability PROGRESS PATCHED NEW MOVEIT FILE TRANSFER FLAW THAT ALLOWS PRIVILEGE ESCALATION Progress, the company behind MOVEit Transfer, has issued a critical security alert addressing a... July 30, 2024 Cyber Security News PROOFPOINT’S EMAIL PROTECTION LET ATTACKERS SEND MILLIONS OF PHISHING EMAILS Hackers use phishing emails to mislead recipients into providing personal data like usernames, passwords,... July 30, 2024 CVE/vulnerability HACKERS EXPLOITING ESXI HYPERVISOR AUTH BYPASS FLAW FOR RANSOMWARE ATTACKS Hackers prefer ransomware attacks primarily because they offer the highest chance of financial gain.... July 30, 2024 cyber security THREAT ACTOR ALLEGEDLY CLAIMING HACK OF MICROSOFT EMPLOYEE’S DEVICE A threat actor has taken to social media to claim responsibility for hacking into... July 30, 2024 Apple CRITICAL OPENSSH “REGRESSHION” VULNERABILITY IMPACTED MACOS SYSTEMS, PATCH NOW A serious flaw in OpenSSH servers, dubbed "regreSSHion," affects macOS systems and could allow... July 30, 2024 Cyber Attack SOCGHOLISH MALWARE ATTACKING WINDOWS USERS USING FAKE BROWSER UPDATE The SocGholish downloader has been in operation since 2017 and it is still evolving.... July 30, 2024 Cyber Attack ACIDPOUR MALWARE ATTACKING LINUX DATA STORAGE DEVICES TO WIPE OUT DATA In March 2024, a new variant of the AcidRain wiper malware dubbed “AcidPour” was... July 30, 2024 FacebookFacebook InstagramInstagram LinkedinLinkedin TwitterTwitter Divya Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world. FREE WEBINAR LOW RATE DDOS ATTACK 9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days. Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods. More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute.. Key takeaways include: * The mechanics of a low-DDoS attack * Fundamentals of behavioural AI and rate-limiting * Surgical mitigation actions to minimize false positives * Role of managed services in DDoS monitoring Book Your Spot RELATED ARTICLES PROGRESS PATCHED NEW MOVEIT FILE TRANSFER FLAW THAT ALLOWS PRIVILEGE ESCALATION PROOFPOINT’S EMAIL PROTECTION LET ATTACKERS SEND MILLIONS OF PHISHING EMAILS HACKERS EXPLOITING ESXI HYPERVISOR AUTH BYPASS FLAW FOR RANSOMWARE ATTACKS THREAT ACTOR ALLEGEDLY CLAIMING HACK OF MICROSOFT EMPLOYEE’S DEVICE CRITICAL OPENSSH “REGRESSHION” VULNERABILITY IMPACTED MACOS SYSTEMS, PATCH NOW CONNECT WITH GBHACKERS ON SECURITY JOIN 70,000 SECURITY PROFESSIONALS Stay safe online with free daily cybersecurity updates. Sign up now! Subscribe GBHackers on security is a highly informative and reliable Cyber Security News platform that provides the latest and most relevant updates on Cyber Security News, Hacking News, Technology advancements, and Kali Linux tutorials on a daily basis. The platform is dedicated to keeping the community well-informed and up-to-date with the constantly evolving Cyber World. MENU * Home * Threats * Vulnerability * Cyber AI * Cyber Tools * Data Breach * Top 10 * What is Linkedin Twitter CONTACT US: Email : admin@gbhackers.com