Category: GBHackers
In today’s REST API-driven landscape, most APIs are REST-based and widely utilized by web applications. These APIs are like versatile…
The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an…
A recently discovered vulnerability in Microsoft Office Word has raised concerns over the security of the popular productivity suite. This…
Wireshark, formerly known as Ethereal, is a widely used, free, and open-source network protocol analyzer that allows users to capture…
Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics. They leverage advanced technologies, use…
ShellTorch Serve is an open-source model-serving library developed by PyTorch that simplifies the deployment of machine learning models for inference…
A buffer overflow issue has been disclosed in the GNU C Library’s dynamic loader ld.so, which might allow local attackers…
A growing cyber threat involving Dropbox has emerged, and it’s raising concerns across the cybersecurity landscape. In the initial two…
Hackers frequently target Microsoft SQL servers because of their extensive use and possible weaknesses. These servers are a top target…
As previously reported, Progress-owned WS_FTP was discovered with multiple vulnerabilities associated with cross-site scripting (XSS), SQL injection, cross-site request forgery,…
The European Telecommunications Standards Institute (ETSI) has uncovered a data breach in which threat actors obtained a database holding a…
A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious…