Category: GBHackers

Git Project Security Vulnerabilities
28
Apr
2023

Git Project Flaws Let Attackers Execute Arbitrary Code

A fresh set of Git releases was made available to fix several security flaws. It gives attackers the ability to…

Critical VMware Vulnerabilities Let Attackers Execute Code
27
Apr
2023

Critical VMware Vulnerabilities Let Attackers Execute Code

VMware Workstation, Workstation Pro, and Fusion have been subjected to several privately reported and fixed flaws. VMware has published a…

TP-Link WAN-Side Vulnerability
27
Apr
2023

TP-Link WAN-Side Vulnerability Exploited to Install Mirai

Mirai botnet exploits CVE-2023-1389 to add TP-Link Archer A21 (AX1800) routers to DDoS attacks. During the Pwn2Own Toronto event in…

Cisco Zero-Day XSS Flaw
27
Apr
2023

Let Remote Attackers Launch XSS

A zero-day flaw in Cisco’s Prime Collaboration Deployment (PCD) software that can be used to launch cross-site scripting attacks has…

New Phishing Attacks
27
Apr
2023

New Phishing Attacks Using ChatGPT

Phishing has been one of the greatest threats to organizations, growing year after year. Phishing attacks have contributed to 90%…

Cisco Launches Advanced Threat Detection XDR Platform
26
Apr
2023

Cisco Launches Advanced Threat Detection XDR Platform

In the recent hybrid, multi-vendor, multi-threat world, Cisco Extended Detection and Response (XDR) streamlines security operations with unrivaled visibility across…

Google Authenticator Major Update Brings Cloud Backup Feature
26
Apr
2023

Google Authenticator Major Update Brings Cloud Backup Feature

Google Authenticator was launched in 2010, which provides additional security for various applications by providing authentication codes for every sign-in….

PoC Exploit Code Released for Critical Papercut Flaw
25
Apr
2023

PoC Exploit Code Released for Critical Papercut Flaw

Threat actors are actively taking advantage of critical vulnerabilities present in the PaperCut MF/NG print management software.  This exploitation aims…

Microsoft Taxonomy
25
Apr
2023

Microsoft Changed the Taxonomy of Naming the Hacker groups

Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to…

Enterprise-Attacking Malware Toolkit Analyzing 70 Billion DNS
24
Apr
2023

Enterprise-Attacking Malware Toolkit Analyzing 70 Billion DNS

The ‘Decoy Dog’ malware toolkit, aimed at enterprises, was uncovered recently by the security analysts at Infoblox by analyzing 70…

Ghosttoken - Zero-Day Flaw
24
Apr
2023

Zero-Day Flaw Used to Create Google Accounts

An Israeli cybersecurity company, Astrix’s Security Research Group, discovered a 0-day vulnerability in Google’s Cloud Platform (GCP) dubbed Ghosttoken on…

What is Single Sign on (SSO) ?
23
Apr
2023

What is Single Sign on (SSO) ?

Single Sign-on is an authentication process that helps to log in to multiple applications using single login credentials. Security is…