Category: GBHackers

NoFilter Windows Privilege escalation
24
Aug
2023

Privilege escalation Abuse Windows Filtering Platform

Privilege escalation is a commonly employed attack vector in the Windows operating system environment. Attackers often leverage offensive tools such…

Malware Sandboxes
24
Aug
2023

Enterprise Device Management With QR Codes

Corporate mobile devices have become essential to everyday tasks for employees, but this convenience also comes with security risks. The…

Kali Linux 2023.3
24
Aug
2023

Kali Linux 2023.3 Released: What’s New!

Kali Linux 2023.3 is now available, and it includes a variety of new packages and tools, as well as the…

GroundPeony Group Exploiting Zero-day Flaw
24
Aug
2023

GroundPeony Group Exploiting Zero-day Flaw

A cyber attack group – GroundPeony, targeting the Taiwanese government, was discovered in March 2023; it used several tactics, such…

Hackers Threaten Patients Following Massive Cyberattack
23
Aug
2023

Hackers Threaten Patients Following Massive Cyberattack

One of the renowned hospitals in Israel became the victim of a data breach, and patients were blackmailed with a…

Malware Sandboxes
23
Aug
2023

How Does it Strengthen Your Cyber Security

Cyberattacks are becoming increasingly sophisticated, threatening organizations’ critical infrastructure and sensitive data more than ever. Core solutions such as SIEMs…

Carderbee Hacking Group - Supply Chain Attack
23
Aug
2023

Carderbee Hacking Group – Supply Chain Attack

For a supply chain attack and to plant the Korplug backdoor (aka PlugX) on the systems of the targeted victims,…

Apache XML Graphics Batik Flaw Exposes Sensitive Information
23
Aug
2023

Apache XML Graphics Batik Flaw Exposes Sensitive Information

Two Server-Side Request Forgery (SSRF) vulnerabilities were found in Apache Batik, which could allow a threat actor to access sensitive…

Let Attackers Access Critical APIs
22
Aug
2023

Let Attackers Access Critical APIs

An unauthenticated critical API access vulnerability was found in the Ivanti Sentry interface, which could allow a threat actor to…

Researchers Uncovered the Developer of CypherRAT & CraxsRAT
22
Aug
2023

Researchers Uncovered the Developer of CypherRAT & CraxsRAT

Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT….

Apache Ivy Injection Flaw
22
Aug
2023

Apache Ivy Injection Flaw Let Attackers Exfiltrate Sensitive Data

A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data…

Juniper Networks Junos OS let Attacker Remotely Execute Code
22
Aug
2023

Juniper Networks Junos OS let Attacker Remotely Execute Code

Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability…