Category: GBHackers

Fortigate SSLVPN Vulnerability exploited-in-the-wild
15
Oct
2024

Fortigate SSLVPN Vulnerability exploited-in-the-wild

A critical vulnerability in Fortinet’s FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in the wild. This format string flaw…

Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Remote Code
15
Oct
2024

Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code

Splunk has disclosed multiple vulnerabilities affecting its Enterprise product, which could allow attackers to execute remote code. These vulnerabilities, primarily…

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address
14
Oct
2024

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies and connecting to various IP addresses….

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details
14
Oct
2024

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on critical infrastructure in the UAE and…

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs
14
Oct
2024

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further investigation, where researchers have identified 40…

Beware of Fake AI Scam Calls that Takeover Your Gmail Account
14
Oct
2024

Beware of Fake AI Scam Calls that Takeover Your Gmail Account

Scammers use sophisticated AI technology to impersonate tech giants like Google, aiming to take over unsuspecting users’ Gmail accounts. A…

pac4j Java Framework Vulnerable to RCE Attacks
14
Oct
2024

pac4j Java Framework Vulnerable to RCE Attacks

A critical security vulnerability has been discovered in the popular Java framework pac4j. The vulnerability specifically affects versions before 4.0…

Zendesk Email Spoofing Flaw Let Attackers Access Support Tickets
14
Oct
2024

Zendesk Email Spoofing Flaw Let Attackers Access Support Tickets

A security vulnerability in Zendesk, a widely used customer service tool, has been uncovered. This flaw allowed attackers to access…

18 Individuals Charged for Widespread Manipulation Cryptocurrency Markets
14
Oct
2024

18 Individuals Charged for Widespread Manipulation Cryptocurrency Markets

18 individuals and entities have been charged with widespread fraud and manipulation within the cryptocurrency markets. The charges, unsealed in…

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication
11
Oct
2024

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, which is designed…

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks
10
Oct
2024

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months through automated defense and proactive prevention….

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution
10
Oct
2024

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading Investigations solution used by CTI teams,…