Category: GBHackers

149 Security Vulnerabilities & Zero-days
10
Apr
2024

149 Security Vulnerabilities & Zero-days

On April Patch Tuesday, Microsoft fixed 149 bugs—one of the biggest security update releases in the company’s history.  Many of…

RUBYCARP the SSH Brute Botnet Resurfaces With New Tools
10
Apr
2024

RUBYCARP the SSH Brute Botnet Resurfaces With New Tools

The cybersecurity community is again on high alert as the notorious botnet group RUBYCARP, known for its SSH brute force…

Critical Rust Flaw Let Attackers Inject Commands on Windows
10
Apr
2024

Critical Rust Flaw Let Attackers Inject Commands on Windows

A new critical vulnerability has been discovered in two of the Rust standard libraries, which could allow a threat actor…

Google Adds V8 Sandbox
10
Apr
2024

New SharePoint Technique Lets Hackers Bypass Security

Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without triggering…

How to Use Cyber Threat Intelligence ? 4 TI Categories
10
Apr
2024

How to Use Cyber Threat Intelligence ? 4 TI Categories

Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…

Google Adds V8 Sandbox
10
Apr
2024

D-Link RCE Vulnerability (CVE-2024-3273) Exploited in Wild

Cybercriminals have actively exploited a critical vulnerability in D-Link Network Attached Storage (NAS) devices globally. Identified as CVE-2024-3273, this remote…

How to Use Cyber Threat Intelligence ? 4 TI Categories
09
Apr
2024

How to Use Cyber Threat Intelligence ? 4 TI Categories

Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…

Cyber Attack on Consulting Firm Expose DOJ Data of 341k People
09
Apr
2024

Cyber Attack on Consulting Firm Expose DOJ Data of 341k People

Greylock McKinnon Associates, a prominent consulting firm, has reported a cyber attack that exposed personal data belonging to 341,000 individuals,…

Ahoi Attacks - New Attack Breaking VMs With Malicious Interrupts
09
Apr
2024

Ahoi Attacks – New Attack Breaking VMs With Malicious Interrupts

Ahoy, which is often associated with communicating to ships, has now been playfully adopted in pirate language. We coin ‘Ahoi,’…

Hackers Using ScrubCrypt 'AV Evasion Tool' Exploit Oracle Servers
09
Apr
2024

Hackers Using ScrubCrypt ‘AV Evasion Tool’ Exploit Oracle Servers

Hackers exploit Oracle WebLogic Servers, knowing that they are extensively used in enterprises. Threat actors can use security vulnerabilities present…

Google Adds V8 Sandbox To Chrome To Fight Against Browser Attacks
09
Apr
2024

Google Adds V8 Sandbox To Chrome To Fight Against Browser Attacks

A Sandbox is a protective medium that blocks the entire system from any application accessing vulnerable resources.  Restrictive environments for…

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable
09
Apr
2024

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable

In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant…