Category: GBHackers

New ARM 'TIKTAG' Attack Impacts Google Chrome, Linux Systems
18
Jun
2024

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data. ARM’s Memory Tagging Extension (MTE) aims…

Operation Celestial Force Employing Android & Windows Malware
17
Jun
2024

Operation Celestial Force Employing Android & Windows Malware

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage campaign named Operation Celestial Force, targeting…

Hidden Backdoor in D-Link Routers Let Attacker Login as Admin
17
Jun
2024

Hidden Backdoor in D-Link Routers Let Attacker Login as Admin

A critical vulnerability has been discovered in several models of D-Link wireless routers, allowing unauthenticated attackers to gain administrative access…

Hackers Employing New Techniques To Attack Docker API
17
Jun
2024

Hackers Employing New Techniques To Attack Docker API

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine hosts by using new binaries chkstart…

FBI Arrested U.K. Hacker Link to Scattered Spider Hacking Group
17
Jun
2024

FBI Arrested U.K. Hacker Link to Scattered Spider Hacking Group

A 22-year-old British man was apprehended by authorities in Palma de Mallorca, Spain. The arrest, carried out by the United…

Smishing Triad Hackers Attacks Banking, E-Commerce Platform
14
Jun
2024

Smishing Triad Hackers Attacks Banking, E-Commerce Platform

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes. Resecurity researchers have recently revealed that…

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files
14
Jun
2024

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a threat actor to read sensitive files…

Sleepy Pickle Exploit Let Attackers Exploit ML Models & End-Users
14
Jun
2024

Sleepy Pickle Exploit Let Attackers Exploit ML Models & End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these systems to steal sensitive data, interrupt…

0day Vulnerability XSS Payloads
14
Jun
2024

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million Ecuadorian citizens. The announcement was made…

0day Vulnerability XSS Payloads
14
Jun
2024

Ascension Hack Caused By Employee Downloaded Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery efforts following a recent cybersecurity breach….

0day Vulnerability XSS Payloads
14
Jun
2024

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection for Amazon Simple Storage Service (Amazon…

0day Vulnerability XSS Payloads
13
Jun
2024

Beware WARMCOOKIE Backdoor Knocking Your Inbox

WARMCOOKIE is a new Windows backdoor that is deployed by a phishing effort with a recruiting theme dubbed REF6127. The…