Category: GBHackers

LightSpy APT Attacking WeChat Users
05
Oct
2023

Top 7 REST API Security Strategies to Secure Your Endpoints

In today’s REST API-driven landscape, most APIs are REST-based and widely utilized by web applications. These APIs are like versatile…

Hackers Exploit Atlassian Confluence Zero-day Flaw
05
Oct
2023

Hackers Exploit Atlassian Confluence Zero-day Flaw

The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an…

Microsoft Office XSS Flaw
05
Oct
2023

Microsoft Office XSS Flaw Let Attackers Execute Arbitrary Code

A recently discovered vulnerability in Microsoft Office Word has raised concerns over the security of the popular productivity suite.  This…

Wireshark 4.0.10 Released: What’s New!
05
Oct
2023

Wireshark 4.0.10 Released: What’s New!

Wireshark, formerly known as Ethereal, is a widely used, free, and open-source network protocol analyzer that allows users to capture…

Huge Surge in Cyber Attacks Targeting Real Estate
05
Oct
2023

Huge Surge in Cyber Attacks Targeting Real Estate

Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics.  They leverage advanced technologies, use…

Hijacking Microsoft SQL Servers
05
Oct
2023

ShellTorch Flaw Exposes Thousands of AI Servers to RCE Attacks

ShellTorch Serve is an open-source model-serving library developed by PyTorch that simplifies the deployment of machine learning models for inference…

Linux Vulnerability Attacks Root Privileges
05
Oct
2023

Linux Vulnerability Attacks Root Privileges

A buffer overflow issue has been disclosed in the GNU C Library’s dynamic loader ld.so, which might allow local attackers…

Hijacking Microsoft SQL Servers
05
Oct
2023

Hackers are Abusing Dropbox to steal Microsoft SharePoint login

A growing cyber threat involving Dropbox has emerged, and it’s raising concerns across the cybersecurity landscape.  In the initial two…

Hackers Hijacking Microsoft SQL Server to Compromise Cloud
05
Oct
2023

Hackers Hijacking Microsoft SQL Server to Compromise Cloud

Hackers frequently target Microsoft SQL servers because of their extensive use and possible weaknesses.  These servers are a top target…

Exploitation of Critical WS_FTP Server Flaw Spotted in the Wild
05
Oct
2023

Exploitation of Critical WS_FTP Server Flaw Spotted in the Wild

As previously reported, Progress-owned WS_FTP was discovered with multiple vulnerabilities associated with cross-site scripting (XSS), SQL injection, cross-site request forgery,…

Hackers Steal User's Database From European Institute
03
Oct
2023

Hackers Steal User’s Database From European Institute

The European Telecommunications Standards Institute (ETSI) has uncovered a data breach in which threat actors obtained a database holding a…

Zip Slip Vulnerability Let Attacker Import Malicious Code
03
Oct
2023

Zip Slip Vulnerability Let Attacker Import Malicious Code

A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious…