Category: GBHackers

Hackers Attack Thousands of Organizations Using Password Spraying
19
Sep
2023

Hackers Attack Thousands of Organizations Using Password Spraying

Peach Sandstorm, an Iranian Hackers group that targets organizations globally, aligns with the following threat groups:- Besides this, in the…

8 XSS Vulnerabilities Allow Attackers to Deliver Malicious Payloads
15
Sep
2023

8 XSS Vulnerabilities Allow Attackers to Deliver Malicious Payloads

Azure HDInsight has been identified with multiple Cross-Site Scripting – XSS vulnerabilities related to Stored XSS and Reflected XSS. The…

Windows11 Themes vulnerability-Attackers Execute Arbitrary Code
15
Sep
2023

Windows11 Themes vulnerability-Attackers Execute Arbitrary Code

An Arbitrary code execution vulnerability has been found in Windows 11. This vulnerability is a result of several factors, such…

Memory Corruption Flaw in ncurses API Library
15
Sep
2023

Memory Corruption Flaw in ncurses API Library

Multiple memory corruption vulnerabilities have been discovered in the ncurses library, which various programs use on multiple operating systems like…

Next-Gen Email Firewall
15
Sep
2023

3AM Ransomware Attack – Stop Services, Delete Shadow Copies

Ransomware is a universal threat to enterprises, targeting anyone handling sensitive data when profit potential is high. A new ransomware…

Trellix DLP Vulnerability Allows Attackers To Delete Files
15
Sep
2023

Trellix DLP Vulnerability Allows Attackers To Delete Files

A privilege escalation vulnerability has been identified in the Trellix Windows DLP endpoint for Windows, which may be exploited to…

Storm-0324
14
Sep
2023

Storm-0324 Using Microsoft Teams to Hack Corporate Networks

According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations….

Next-Gen Email Firewall
14
Sep
2023

How to to Secure Your Inboxes 2023

Email communication is still widely used as an attack vector despite the ever-changing nature of cyber threats. The vast number…

Cisco IOS Verification Flaw Let Attackers Execute Arbitrary Code
14
Sep
2023

Cisco IOS Verification Flaw Let Attackers Execute Arbitrary Code

Cisco has been discovered with an arbitrary code execution flaw on their Cisco IOS XR Software image verification checks, which…

SolarWinds Platform Vulnerability Let Attackers Execute Arbitrary Commands
14
Sep
2023

SolarWinds Platform Vulnerability Let Attackers Execute Arbitrary Commands

SolarWinds Platform has published its release notes 2023.3.1, which provides multiple bug fixes and security updates. With this release, the…

Hackers Attack Facebook Business Users Aggressively to Steal Login Credentials
13
Sep
2023

Hackers Attack Facebook Business Users Aggressively to Steal Login Credentials

A new and highly concerning cyber threat has emerged, as a botnet known as “MrTonyScam” has been orchestrating an extensive…

ReconAIzer Burp Extension
13
Sep
2023

OpenAI-based Extension for Burp Suite

Burp Suite, the renowned Bug Bounty Hunting and Web Application Penetration Testing tool, has been improvised with many extensions over…