gbhackers.com Open in urlscan Pro
172.67.165.236  Public Scan

URL: https://gbhackers.com/ubook-suffered-data-breach/
Submission: On July 31 via manual from BR — Scanned from US

Form analysis 4 forms found in the DOM

POST #

<form class="td-login-form-wrap" action="#" method="post">
  <div class="td-login-panel-title"><span>Welcome!</span>Log into your account</div>
  <div class="td_display_err"></div>
  <div class="td-login-inputs"><input class="td-login-input" autocomplete="username" type="text" name="login_email" id="login_email-mob" value="" required=""><label for="login_email-mob">your username</label></div>
  <div class="td-login-inputs"><input class="td-login-input" autocomplete="current-password" type="password" name="login_pass" id="login_pass-mob" value="" required=""><label for="login_pass-mob">your password</label></div>
  <input type="button" name="login_button" id="login_button-mob" class="td-login-button" value="LOG IN">
  <div class="td-login-info-text">
    <a href="#" id="forgot-pass-link-mob">Forgot your password?</a>
  </div>
  <div class="td-login-register-link"></div>
</form>

GET https://gbhackers.com/

<form method="get" class="td-search-form" action="https://gbhackers.com/">
  <div class="td-search-close">
    <span><i class="td-icon-close-mobile"></i></span>
  </div>
  <div role="search" class="td-search-input">
    <span>Search</span>
    <input id="td-header-search-mob" type="text" value="" name="s" autocomplete="off">
  </div>
</form>

GET https://gbhackers.com/

<form method="get" class="tdb-search-form" action="https://gbhackers.com/">
  <div class="tdb-search-form-inner"><input class="tdb-head-search-form-input" placeholder=" " type="text" value="" name="s" autocomplete="off"><button class="wpb_button wpb_btn-inverse btn tdb-head-search-form-btn"
      type="submit"><span>Search</span></button></div>
</form>

Name: mc-embedded-subscribe-formPOST https://gbhackers.us14.list-manage.com/subscribe/post?u=6c205143b8eda9ef337293b61&id=03468a2199&f_id=00d6c2e1f0

<form class="tdn-form" action="https://gbhackers.us14.list-manage.com/subscribe/post?u=6c205143b8eda9ef337293b61&amp;id=03468a2199&amp;f_id=00d6c2e1f0" method="post" name="mc-embedded-subscribe-form" target="_blank">
  <div class="tdn-email-bar">
    <div class="tdn-input-wrap"><input type="email" aria-label="email" name="EMAIL" placeholder="Your email address" required=""></div>
    <div class="tdn-btn-wrap"><button class="tdn-submit-btn" type="submit" name="subscribe">Subscribe</button></div>
  </div>
</form>

Text Content

Linkedin

Sign in
 * Home
 * Threats
 * Vulnerability
 * Cyber AI
 * Cyber Tools
 * Data Breach
 * Top 10
 * What is

Sign in

Welcome!Log into your account

your username
your password
Forgot your password?

Password recovery
Recover your password

your email

Search

GBHackers On SecurityTrusted Cyber Security News Platform



Tuesday, July 30, 2024
 * Home
 * Threats
 * Vulnerability
 * Cyber AI
 * Cyber Tools
 * Data Breach
 * Top 10
 * What is

Linkedin
Twitter
GBHackers On SecurityTrusted Cyber Security News Platform

 * Home
 * Threats
   * cyber security
     
     
     SSLOAD MALWARE EMPLOYS MSI INSTALLER TO KICK-START DELIVERY CHAIN
     
     
     cyber security
     
     
     CRIMINAL IP AND QUAD9 COLLABORATE TO EXCHANGE DOMAIN AND IP THREAT
     INTELLIGENCE
     
     
     THREATS
     
     
     WHAT IS GLOBAL THREAT INTELLIGENCE? – SOC/DFIR TEAM GUIDE
     
     
     Cyber Security News
     
     
     NEW ACOUSTIC KEYBOARD SIDE CHANNEL ATTACK LET ATTACKERS STEAL SENSITIVE
     DATA
     
     
     cyber security
     
     
     RA WORLD RANSOMWARE ATTACK WINDOWS USING HACKED DOMAIN CONTROL & ANTI-AV
     TACTICS
     
     
     
 * Vulnerability
   * CVE/vulnerability
     
     
     PROGRESS PATCHED NEW MOVEIT FILE TRANSFER FLAW THAT ALLOWS PRIVILEGE
     ESCALATION
     
     
     CVE/vulnerability
     
     
     RASPAP FLAW LET HACKERS ESCALATE PRIVILEGES WITH RASPBERRY PI DEVICES
     
     
     CVE/vulnerability
     
     
     CISCO PATCHES THE PRODUCTS IMPACTED BY RADIUS PROTOCOL VULNERABILITY
     
     
     Chrome
     
     
     GOOGLE CHROME 127 RELEASED WITH A FIX FOR 24 SECURITY VULNERABILITIES
     
     
     CVE/vulnerability
     
     
     SONICOS IPSEC VPN VULNERABILITY LET ATTACKERS CAUSE DOS CONDITION
     
     
     
 * Cyber AI
   * Cyber AI
     
     
     CISA CONDUCTS FIRST-EVER TABLETOP EXERCISE FOCUSED ON AI CYBER INCIDENT
     RESPONSE
     
     
     Artificial Intelligence
     
     
     SLEEPY PICKLE EXPLOIT LET ATTACKERS EXPLOIT ML MODELS AND ATTACK END-USERS
     
     
     Cyber AI
     
     
     PHISHING ATTACKS RISE BY 58% AS THE ATTACKERS LEVERAGE AI TOOLS
     
     
     Cyber AI
     
     
     NSA, CISA & FBI RELEASED BEST PRACTICES FOR AI SECURITY DEPLOYMENT 2024
     
     
     Cyber AI
     
     
     ZOOM UNVEILS AI-POWERED ALL-IN-ONE AI WORK WORKPLACE
     
     
     
 * Cyber Tools
 * Data Breach
   * cyber security
     
     
     UBOOK SUFFERED DATA BREACH, 710,000 USERS’ DATA EXPOSED
     
     
     cyber security
     
     
     THREAT ACTOR ALLEGEDLY CLAIMING BREACH OF CYEPR
     
     
     cyber security
     
     
     HACKERS CLAIM BREACH OF DAIKIN: 40 GB OF CONFIDENTIAL DATA EXPOSED
     
     
     cyber security
     
     
     DATA BREACH INCREASES BY OVER 1,000% ANNUALLY
     
     
     cyber security
     
     
     HACKERS CLAIMING DETTOL DATA BREACH: 453,646 USERS IMPACTED
     
     
     
 * Top 10
   * cyber security
     
     
     TOP 10 ACTIVE DIRECTORY MANAGEMENT TOOLS – 2024
     
     
     Computer Security
     
     
     BEST SIEM TOOLS LIST FOR SOC TEAM – 2024
     
     
     Checklist
     
     
     WEB SERVER PENETRATION TESTING CHECKLIST – 2024
     
     
     Network Pentesting
     
     
     50+ NETWORK PENETRATION TESTING TOOLS FOR HACKERS & SECURITY PROFESSIONALS
     – 2024
     
     
     Business
     
     
     10 PROMINENT CYBERSECURITY ACQUISITIONS OF 2023
     
     
     
 * What is
   * Android
     
     
     TOP 10 BEST PENETRATION TESTING COMPANIES & SERVICES IN 2024
     
     
     Computer Security
     
     
     BEST SIEM TOOLS LIST FOR SOC TEAM – 2024
     
     
     Malware
     
     
     SHOULD YOU USE A VPN FOR ONLINE SECURITY? 4 TYPES OF MALWARE AND HOW TO
     PROTECT YOURSELF
     
     
     cyber security
     
     
     WHAT IS ENCRYPTION IN MALWARE? – UNDERSTAND FROM BASICS TO XOR
     
     
     Cyber Attack
     
     
     CLIENT-SIDE EXPLOITATION: POISONING WEBDAV+URL+LNK TO DELIVER MALICIOUS
     PAYLOADS
     
     
     

Search





UBOOK SUFFERED DATA BREACH, 710,000 USERS’ DATA EXPOSED



July 30, 2024
By Divya



The popular audiobook and podcast platform uBook has been affected by a data
breach that exposed the personal information of 710,000 users.

According to a tweet by ThreatMon, the breach, which occurred in July 2024, was
announced by a member of a dark web forum, raising serious concerns about user
privacy and data security.




DETAILS OF THE BREACH

According to the announcement on the dark web forum, the compromised data
includes email addresses, full names, dates of birth, genders, and profile
pictures of the affected users.

If in the wrong hands, this information could be used for various malicious
activities, including identity theft and phishing attacks. The breach has left
many users worried about potentially misusing their personal information.



uBook, which has quickly become a favorite among audiobook and podcast
enthusiasts, has not yet released an official statement regarding the breach.

How to Build a Security Framework With Limited Resources IT Security Team (PDF)
- Free Guide

However,  cybersecurity experts urge users to take immediate precautions, such
as changing their passwords and being vigilant about suspicious emails or
activities related to their accounts.


EXPERT ANALYSIS AND RECOMMENDATIONS

 Cybersecurity analysts have quickly assessed the situation, emphasizing the
importance of robust security measures for companies handling vast amounts of
personal data.

“This breach highlights the critical need for companies to invest in advanced
security protocols and regular security audits,” said Jane Doe, a  cybersecurity
expert at SecureTech.

“Users should also be proactive in protecting their information by using strong,
unique passwords and enabling two-factor authentication where possible.

“In light of the breach, experts recommend that uBook users monitor their
accounts for any unusual activity and consider using identity theft protection
services. Additionally, users should be cautious of potential phishing attempts
that may arise from the exposed data.

As the investigation into the uBook data breach continues, it is a stark
reminder of the vulnerabilities in the digital age.



Companies must prioritize the security of their users’ data to maintain trust
and prevent future incidents. For now, uBook users are left to grapple with the
fallout of this significant breach, hoping for swift action and transparency
from the platform.

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access
with ANY.RUN -> Free Access

 * Tags
 * Cyber Security News
 * Data Breach


LATEST ARTICLES

CVE/vulnerability


PROGRESS PATCHED NEW MOVEIT FILE TRANSFER FLAW THAT ALLOWS PRIVILEGE ESCALATION

Progress, the company behind MOVEit Transfer, has issued a critical security
alert addressing a...
July 30, 2024
Cyber Security News


PROOFPOINT’S EMAIL PROTECTION LET ATTACKERS SEND MILLIONS OF PHISHING EMAILS

Hackers use phishing emails to mislead recipients into providing personal data
like usernames, passwords,...
July 30, 2024
CVE/vulnerability


HACKERS EXPLOITING ESXI HYPERVISOR AUTH BYPASS FLAW FOR RANSOMWARE ATTACKS

Hackers prefer ransomware attacks primarily because they offer the highest
chance of financial gain....
July 30, 2024
cyber security


THREAT ACTOR ALLEGEDLY CLAIMING HACK OF MICROSOFT EMPLOYEE’S DEVICE

 A threat actor has taken to social media to claim responsibility for hacking
into...
July 30, 2024
Apple


CRITICAL OPENSSH “REGRESSHION” VULNERABILITY IMPACTED MACOS  SYSTEMS, PATCH NOW

A serious flaw in OpenSSH servers, dubbed "regreSSHion," affects macOS systems
and could allow...
July 30, 2024
Cyber Attack


SOCGHOLISH MALWARE ATTACKING WINDOWS USERS USING FAKE BROWSER UPDATE

The SocGholish downloader has been in operation since 2017 and it is still
evolving....
July 30, 2024
Cyber Attack


ACIDPOUR MALWARE ATTACKING LINUX DATA STORAGE DEVICES TO WIPE OUT DATA

In March 2024, a new variant of the AcidRain wiper malware dubbed “AcidPour”
was...
July 30, 2024
FacebookFacebook
InstagramInstagram
LinkedinLinkedin
TwitterTwitter

Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats,
Breaches, Vulnerabilities and other happenings in the cyber world.





FREE WEBINAR


LOW RATE DDOS ATTACK

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30
days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation
checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS
attacks where millions of IPs are being employed to send one or two requests per
minute..
Key takeaways include:

 * The mechanics of a low-DDoS attack
 * Fundamentals of behavioural AI and rate-limiting
 * Surgical mitigation actions to minimize false positives
 * Role of managed services in DDoS monitoring

   

   
   Book Your Spot



RELATED ARTICLES


PROGRESS PATCHED NEW MOVEIT FILE TRANSFER FLAW THAT ALLOWS PRIVILEGE ESCALATION


PROOFPOINT’S EMAIL PROTECTION LET ATTACKERS SEND MILLIONS OF PHISHING EMAILS


HACKERS EXPLOITING ESXI HYPERVISOR AUTH BYPASS FLAW FOR RANSOMWARE ATTACKS


THREAT ACTOR ALLEGEDLY CLAIMING HACK OF MICROSOFT EMPLOYEE’S DEVICE


CRITICAL OPENSSH “REGRESSHION” VULNERABILITY IMPACTED MACOS  SYSTEMS, PATCH NOW





CONNECT WITH GBHACKERS ON SECURITY


JOIN 70,000 SECURITY PROFESSIONALS

Stay safe online with free daily  cybersecurity updates. Sign up now!

Subscribe

GBHackers on security is a highly informative and reliable  Cyber Security News
platform that provides the latest and most relevant updates on  Cyber Security
News, Hacking News, Technology advancements, and Kali Linux tutorials on a daily
basis. The platform is dedicated to keeping the community well-informed and
up-to-date with the constantly evolving Cyber World.





MENU

 * Home
 * Threats
 * Vulnerability
 * Cyber AI
 * Cyber Tools
 * Data Breach
 * Top 10
 * What is

Linkedin
Twitter


CONTACT US:

Email : admin@gbhackers.com