Category: GBHackers

Trellix DLP Vulnerability Allows Attackers To Delete Files
15
Sep
2023

Trellix DLP Vulnerability Allows Attackers To Delete Files

A privilege escalation vulnerability has been identified in the Trellix Windows DLP endpoint for Windows, which may be exploited to…

Storm-0324
14
Sep
2023

Storm-0324 Using Microsoft Teams to Hack Corporate Networks

According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations….

Next-Gen Email Firewall
14
Sep
2023

How to to Secure Your Inboxes 2023

Email communication is still widely used as an attack vector despite the ever-changing nature of cyber threats. The vast number…

Cisco IOS Verification Flaw Let Attackers Execute Arbitrary Code
14
Sep
2023

Cisco IOS Verification Flaw Let Attackers Execute Arbitrary Code

Cisco has been discovered with an arbitrary code execution flaw on their Cisco IOS XR Software image verification checks, which…

SolarWinds Platform Vulnerability Let Attackers Execute Arbitrary Commands
14
Sep
2023

SolarWinds Platform Vulnerability Let Attackers Execute Arbitrary Commands

SolarWinds Platform has published its release notes 2023.3.1, which provides multiple bug fixes and security updates. With this release, the…

Hackers Attack Facebook Business Users Aggressively to Steal Login Credentials
13
Sep
2023

Hackers Attack Facebook Business Users Aggressively to Steal Login Credentials

A new and highly concerning cyber threat has emerged, as a botnet known as “MrTonyScam” has been orchestrating an extensive…

ReconAIzer Burp Extension
13
Sep
2023

OpenAI-based Extension for Burp Suite

Burp Suite, the renowned Bug Bounty Hunting and Web Application Penetration Testing tool, has been improvised with many extensions over…

Weaponized Free Download Manager for Linux Steals System Data
13
Sep
2023

Weaponized Free Download Manager for Linux Steals System Data

In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1…

Chinese Redfly Hacked National Power Grid & Maintained Access for 6 Months
13
Sep
2023

Chinese Redfly Hacked National Power Grid & Maintained Access for 6 Months

Cybersecurity researchers at Symantec’s Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach…

Mozilla Zero-Day Vulnerability Exploited in the Wild
13
Sep
2023

Mozilla Zero-Day Vulnerability Exploited in the Wild

In a race against time to safeguard user security, major browser vendors, including Google and Mozilla, have scrambled to release…

Chrome Zero-Day Vulnerability Exploited in the Wild
13
Sep
2023

Chrome Zero-Day Vulnerability Exploited in the Wild

Chrome’s Stable and Extended stable channels have been upgraded to 116.0.5845.187 for Mac and Linux and 116.0.5845.187/.188 for Windows as…

Windows Arbitrary File Deletion Flaw Leads System compromise
13
Sep
2023

Windows Arbitrary File Deletion Flaw Leads System compromise

Threat actors were using Windows Arbitrary File Deletion to perform Denial-of-service attacks on systems affected by this vulnerability. However, recent…