Category: GBHackers

Nagios Monitoring Tool Vulnerabilities
21
Sep
2023

T-Mobile App Glitch Exposes Other User’s Sensitive Data

The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy….

Bumblebee Abuses WebDAV Protocol to Attack Organizations
20
Sep
2023

Bumblebee Abuses WebDAV Protocol to Attack Organizations

In recent cybersecurity news, the notorious Bumblebee loader has made a resurgence in a new campaign, posing a significant threat…

Nagios Monitoring Tool Vulnerabilities
20
Sep
2023

China Accuses the US of Hacking Huawei Servers Since 2009

Huawei is known for its telecommunications equipment and consumer electronics, including smartphones, and the USA banned Huawei primarily due to…

Nagios Monitoring Tool Vulnerabilities
20
Sep
2023

Nagios Monitoring Tool Vulnerabilities Let Attackers SQL Queries

Nagios XI is a prominent and frequently used commercial monitoring system for IT infrastructure and network monitoring.  Vulnerability Research Engineer…

Hackers have deployed a Linux backdoor to attack government entities
20
Sep
2023

Hackers have deployed a Linux backdoor to attack government entities

Recent reports indicate that threat actors have been using a new type of Linux-targeted backdoor that has never been seen…

Fortinet FortiOS Security Flaw Allows Malicious Code to Be Executed
20
Sep
2023

Fortinet FortiOS Security Flaw Allows Malicious Code to Be Executed

Recent reports indicate that Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which…

Hackers Attacking Telecoms Servers With HTTPSnoop Malware
20
Sep
2023

Hackers Attacking Telecoms Servers With HTTPSnoop Malware

In 2022, state-sponsored actors and advanced adversaries consistently targeted telecoms globally, making it a top sector in Talos IR cases….

Juniper Firewalls Vulnerable to Unauthenticated Code Execution
20
Sep
2023

Juniper Firewalls Vulnerable to Unauthenticated Code Execution

At the end of August 2023, Juniper Networks released a security advisory mentioning the CVE-2023-36845 vulnerability affecting SRX and EX…

BlackCat Ransomware
20
Sep
2023

BlackCat Ransomware Leveraging Remote Monitoring Tools

BlackCat Ransomware variant Sphynx has been newly identified with additional features used for encrypting Azure Storage accounts. This Sphynx variant…

AMBERSQUID Cryptojacking
20
Sep
2023

Hackers Are Using AI For Cyberattacks. How Can We Stop Them?

The use of AI has greatly increased over the past few months, with programs like ChatGPT and Bing AI making…

Cryptojacking Attack Leverages AWS Services
20
Sep
2023

Cryptojacking Attack Leverages AWS Services

Cryptojacking is a malicious cyberattack in which an attacker stealthily utilizes a victim’s computer or device to mine cryptocurrencies such…

Pro-Russian Actors Initiated DDoS Against Canadian Organizations
19
Sep
2023

Pro-Russian Actors Initiated DDoS Against Canadian Organizations

The Canadian government, banking, and transportation industries have recently been the targets of many distributed denial of service (DDoS) attacks….