Category: GBHackers

Passwordless Authentication Standard FIDO2 Flaw
13
May
2024

Scattered Spider Attacking Finance & Insurance Industries

Hackers very frequently target the finance and insurance sectors due to the large volumes of sensitive data that they own….

Passwordless Authentication Standard FIDO2 Flaw
13
May
2024

Critical Cacti Vulnerability Let Attackers Execute Remote Code

Cacti, the widely utilized network monitoring tool, has recently issued a critical security update to address a series of vulnerabilities,…

Nmap 7.95 Released – What’s New!
13
May
2024

Nmap 7.95 released – What’s New!

Nmap’s version 7.95 emerges as a testament to the relentless efforts of its development team, spearheaded by the renowned Gordon…

Passwordless Authentication Standard FIDO2 Flaw
13
May
2024

Microsoft Edge Zero-Day Vulnerability Exploited in the Wild

A zero-day vulnerability in Microsoft Edge, which has been tagged as CVE-2024-4671, has been aggressively exploited by evil organizations, according…

Hackers Moving To AI
13
May
2024

Passwordless Auth Standard FIDO2 Flaw Let Attackers Launch MITM Attacks

FIDO2 (Fast Identity Online) is a passwordless authentication method developed by FIDO Alliance to prevent Man-in-the-Middle (MiTM) attacks, Phishing attacks,…

Hackers Moving To AI
13
May
2024

Apache OFBiz RCE Flaw – Execute Malicious Code Remotely

Many businesses use enterprise resource planning (ERP) systems like Apache OFBiz. However, it has been found to have significant security…

Hackers Moving To AI
13
May
2024

Ohio Lottery Hacked: 500,000+ Customers Data Exposed

A major cybersecurity breach happened at the Ohio Lottery, letting people into its private systems without permission. The breach wasn’t…

Hackers Moving To AI
13
May
2024

Hackers Exploiting Vulnerabilities 50% Faster, Within 4.76 Days

Cybersecurity researchers are sounding the alarm that hackers are exploiting software vulnerabilities faster than ever before. A new report from…

PuTTY Private Key Recovery Vulnerability
12
May
2024

Hackers Moving To AI, But Lacking Behind The Defenders In Adoption Rates

Hackers were actively exploiting the generative AI for cyber attacks; not only that, even threat actors are also exploring new…

PuTTY Private Key Recovery Vulnerability
11
May
2024

PuTTY Private Key Recovery Vulnerability

Security researchers have published a Proof-of-Concept (PoC) exploit for a critical vulnerability in the widely used PuTTY SSH and Telnet…

Attack AND Defense Playground For Automotive System
11
May
2024

Attack AND Defense Playground For Automotive System

Modern cars have microcontrollers that use the Controller Area Network (CAN) to perform safety and luxury functions.  However, vehicle hijacking…

Stack Overflow Users Delete Posts
10
May
2024

DDoS Attack Size Increased by 233.33%, UDP-Based are Popular

The latest Nexusguard DDoS Trend Report for 2024 has unveiled a significant escalation in the size of Distributed Denial of…