Category: GBHackers

Kali Linux 2023.3
24
Aug
2023

Kali Linux 2023.3 Released: What’s New!

Kali Linux 2023.3 is now available, and it includes a variety of new packages and tools, as well as the…

GroundPeony Group Exploiting Zero-day Flaw
24
Aug
2023

GroundPeony Group Exploiting Zero-day Flaw

A cyber attack group – GroundPeony, targeting the Taiwanese government, was discovered in March 2023; it used several tactics, such…

Hackers Threaten Patients Following Massive Cyberattack
23
Aug
2023

Hackers Threaten Patients Following Massive Cyberattack

One of the renowned hospitals in Israel became the victim of a data breach, and patients were blackmailed with a…

Malware Sandboxes
23
Aug
2023

How Does it Strengthen Your Cyber Security

Cyberattacks are becoming increasingly sophisticated, threatening organizations’ critical infrastructure and sensitive data more than ever. Core solutions such as SIEMs…

Carderbee Hacking Group - Supply Chain Attack
23
Aug
2023

Carderbee Hacking Group – Supply Chain Attack

For a supply chain attack and to plant the Korplug backdoor (aka PlugX) on the systems of the targeted victims,…

Apache XML Graphics Batik Flaw Exposes Sensitive Information
23
Aug
2023

Apache XML Graphics Batik Flaw Exposes Sensitive Information

Two Server-Side Request Forgery (SSRF) vulnerabilities were found in Apache Batik, which could allow a threat actor to access sensitive…

Let Attackers Access Critical APIs
22
Aug
2023

Let Attackers Access Critical APIs

An unauthenticated critical API access vulnerability was found in the Ivanti Sentry interface, which could allow a threat actor to…

Researchers Uncovered the Developer of CypherRAT & CraxsRAT
22
Aug
2023

Researchers Uncovered the Developer of CypherRAT & CraxsRAT

Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT….

Apache Ivy Injection Flaw
22
Aug
2023

Apache Ivy Injection Flaw Let Attackers Exfiltrate Sensitive Data

A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data…

Juniper Networks Junos OS let Attacker Remotely Execute Code
22
Aug
2023

Juniper Networks Junos OS let Attacker Remotely Execute Code

Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability…

DotRunpeX Injector Widely Delivers Known Malware Families to Attack Windows
22
Aug
2023

DotRunpeX Injector Widely Delivers Known Malware Families to Attack Windows

DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware…

Cyber Criminals hide malicious traffic
21
Aug
2023

3,000+ Android Malware Using Unique Compression Methods

Android Smartphones lay a vital role in our daily life, as they help us to stay connected and, not only…