Category: GBHackers

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data
27
Jan
2025

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in Intel Trust Domain Extensions (TDX), a…

GitHub Vulnerability Exposes User Credentials via Malicious Repositories
27
Jan
2025

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper handling of credential protocols can lead…

Critical IBM Security Directory Vulnerability Enables Session Cookie Theft
27
Jan
2025

Critical IBM Security Directory Vulnerability Enables Session Cookie Theft

Free Webinar – DevSecOps Hacks By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes,…

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors
27
Jan
2025

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent a nationwide ban on TikTok, involving…

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows
27
Jan
2025

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through 9.7.0. The issue, classified as a…

Apache Solr For Windows instances Vulnerability Allows Arbitrary Path Write-Access
27
Jan
2025

Apache Solr For Windows instances Vulnerability Allows Arbitrary Path Write-Access

A critical security vulnerability (CVE-2024-52012) affecting Apache Solr instances on Windows has been identified, allowing attackers to gain arbitrary file…

11-Day Timeline from Initial Compromise to Deployment
27
Jan
2025

11-Day Timeline from Initial Compromise to Deployment

A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across a corporate environment. The attack,…

Weaponised XWorm RAT builder Attacking script kiddies to Steal Sensitive Data
27
Jan
2025

Weaponised XWorm RAT builder Attacking script kiddies to Steal Sensitive Data

A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan (RAT) builder has compromised over 18,000…

Burp Suite 2025.1 Released, What’s New!
27
Jan
2025

Burp Suite 2025.1 Released, What’s New!

Burp Suite 2025.1, is packed with new features and enhancements designed to improve your web application testing workflow. This latest…

Chrome Security Update - Patch for 3 High-Severity Vulnerabilities
27
Jan
2025

Chrome Security Update – Patch for 3 High-Severity Vulnerabilities

Google has released a critical update for the Chrome browser, addressing three high-severity security vulnerabilities. This patch, part of the…

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials
27
Jan
2025

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare’s workers.dev, a free domain name service, to execute credential theft campaigns….

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel
27
Jan
2025

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel

 A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could potentially lead to privilege escalation in…