Category: GBHackers

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection
07
Oct
2024

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has partnered with Hybrid Analysis, a…

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code
07
Oct
2024

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that could allow attackers to execute remote…

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files
07
Oct
2024

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual Studio by focusing on vulnerabilities that…

Microsoft & DOJ Dismantles Hundreds of Websites Used by Russian Hackers
07
Oct
2024

Microsoft & DOJ Dismantles Hundreds of Websites Used by Russian Hackers

Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations of Star Blizzard, a notorious Russian hacking group….

Chinese Group Hacked US Court Wiretap Systems
07
Oct
2024

Chinese Group Hacked US Court Wiretap Systems

Chinese hackers have infiltrated the networks of major U.S. broadband providers, gaining access to systems used for court-authorized wiretapping. According…

19.6K+ Public Zimbra Installations Vulnerable to Code Execution Attacks
07
Oct
2024

19.6K+ Public Zimbra Installations Vulnerable to Code Execution Attacks

A critical vulnerability in Zimbra’s postjournal service, identified as CVE-2024-45519, has left over 19,600 public Zimbra installations exposed to remote…

Prince Ransomware Hits UK and US via Royal Mail Phishing Scam
04
Oct
2024

Prince Ransomware Hits UK and US via Royal Mail Phishing Scam

A new ransomware campaign targeting individuals and organizations in the UK and the US has been identified. The attack, known…

Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group
04
Oct
2024

Microsoft, DOJ Dismantle Domains Used by Russian FSB-Linked Hacking Group

Microsoft and the U.S. Department of Justice (DOJ) have successfully dismantled a network of domains a Russian hacking group linked…

Linux Malware perfctl Attacking Millions of Linux Servers
04
Oct
2024

Linux Malware perfctl Attacking Millions of Linux Servers

Researchers have uncovered a sophisticated Linux malware, dubbed “perfctl,” actively targeting millions of Linux servers worldwide. This malicious software exploits…

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP
03
Oct
2024

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP

Decoding Compliance | What CISOs Need to Know Non-compliance can result in substantial financial penalties, with average fines reaching up…

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions
03
Oct
2024

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions

At DEF CON 32, the SquareX research team delivered a hard-hitting presentation titled Sneaky Extensions: The MV3 Escape Artists where…

Doppler Launches 'Change Requests' to Strengthen Secrets Management Security with Audited Approvals
03
Oct
2024

Doppler Launches ‘Change Requests’ to Strengthen Secrets Management Security with Audited Approvals

Doppler, the leading platform in secrets management, today announces the launch of Change Requests, a new feature providing engineering teams…