Category: GBHackers

F5's Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely
09
May
2024

F5’s Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely

In a significant cybersecurity development, researchers have uncovered critical vulnerabilities in F5’s Next Central Manager, which could potentially allow attackers…

Bangladesh IT Database Compromise: 95k Email Address Leaked
09
May
2024

Bangladesh IT Database Compromise: 95k Email Address Leaked

Tappware, a prominent IT service provider, faced a breach when approximately 50GB of its database was leaked on a hacker…

Polish Government Under Cyber Attack From APT28 Hacker Group
09
May
2024

Polish Government Under Cyber Attack From APT28 Hacker Group

The Polish computer emergency response team CERT.pl has issued a warning about an ongoing cyberattack campaign by the notorious APT28…

How Does ANY RUN Sandbox Protect Enterprise Users
08
May
2024

How Does ANY RUN Sandbox Protect Enterprise Users

Ensuring adherence to GDPR, the ANY RUN sandbox service employs TLS 1.3 for data in transit and AES-256 for data…

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)
08
May
2024

Free Workshop from Security Risk Advisors Empowers Organizations to Select Optimal OT Security Tools – GBHackers on Security

Security Risk Advisors (SRA) announces the launch of their OT/XIoT Detection Selection Workshop, a complimentary offering designed to assist organizations…

Hackers Employing Steganography Method to Deliver RemcosRAT
08
May
2024

Hackers Employing Steganography Method to Deliver RemcosRAT

Hackers are now using steganography techniques to distribute the notorious Remote Access Trojan (RAT) known as RemcosRAT. This method, which…

CrushFTP Vulnerability Exploited in Wild to Execute Remote Code
08
May
2024

CrushFTP Vulnerability Exploited in Wild to Execute Remote Code

A critical vulnerability in CrushFTP, identified as CVE-2024-4040, has been actively exploited in the wild. It allows attackers to perform…

Hackers Abuse Google Search Ads to Deliver MSI-Packed Malware
08
May
2024

Hackers Abuse Google Search Ads to Deliver MSI-Packed Malware

Hackers have been found exploiting Google search ads to distribute malware through MSI (Microsoft Installer) packages. This campaign, involving the…

Veeam RCE Flaws Let Hackers Gains Access To VSPC Servers
08
May
2024

Veeam RCE Flaws Let Hackers Gains Access To VSPC Servers

Veeam Service Provider console has been discovered with two critical vulnerabilities that were associated with Remote Code Execution. A CVE…

Critical PDF.js & React-PDF Vulnerabilities Threatens PDF Users
08
May
2024

Critical PDF.js & React-PDF Vulnerabilities Threatens PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat actor to execute arbitrary code when…

Hackers Actively Exploiting Ivanti Pulse Secure Vulnerabilities
08
May
2024

Hackers Actively Exploiting Ivanti Pulse Secure Vulnerabilities

Juniper Threat Labs has reported active exploitation attempts targeting vulnerabilities in Ivanti Pulse Secure VPN appliances. These vulnerabilities, identified as…

Google Streamlines Two-Factor Authentication Setup Process
08
May
2024

Google Streamlines Two-Factor Authentication Setup Process

Google has announced an update to its two-factor authentication (2FA) process, also known as 2-step Verification (2SV), aimed at simplifying…