Category: GBHackers

Hackers Exploiting Apache OFBiz RCE Vulnerability in the Wild
13
Sep
2024

Hackers Exploiting Apache OFBiz RCE Vulnerability in the Wild

A critical vulnerability in the Apache OFBiz framework has been actively exploited by hackers. The flaw designated CVE-2024-45195, allows for…

Docker Desktop Vulnerabilities Let Attackers Execute Remote Code
13
Sep
2024

Docker Desktop Vulnerabilities Let Attackers Execute Remote Code

Docker has addressed critical vulnerabilities in Docker Desktop that could allow attackers to execute remote code. These vulnerabilities, identified as…

Fortinet Confirms Data Breach Following Hacker's Claim of 440GB Data Theft
13
Sep
2024

Fortinet Confirms Data Breach Following Hacker’s Claim of 440GB Data Theft

Fortinet, a leading cybersecurity firm, has confirmed a data breach involving a third-party cloud service after a hacker, known by…

13
Sep
2024

SquareX, Awarded Rising Star Category in CybersecAsia Readers’ Choice Awards 2024 – GBHackers Security

SquareX has been named a winner of the prestigious Rising Star category in CybersecAsia Readers’ Choice Awards 2024 Awards, due…

Threat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS Tunneling
12
Sep
2024

Threat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS Tunneling

The Iranian threat actor APT34, also known as GreenBug, has recently launched a new campaign targeting Iraqi government entities by…

Aembit Raises $25 Million in Series A Funding for Non-Human Identity and Access Management
12
Sep
2024

Aembit Raises $25 Million in Series A Funding for Non-Human Identity and Access Management

The investment will drive the company’s advancement of scalable workload access management for enterprises Aembit, the leading non-human identity and…

Mastercard to Acquire Recorded Future for $2.65 Billion
12
Sep
2024

Mastercard to Acquire Recorded Future for $2.65 Billion

In a strategic move to bolster its cybersecurity capabilities, Mastercard has announced an agreement to acquire Recorded Future, a leading…

Critical Vulnerabilities in JPEG 2000 Library Let Attackers Execute Remote Code
12
Sep
2024

Critical Vulnerabilities in JPEG 2000 Library Let Attackers Execute Remote Code

Exploiting memory corruption vulnerabilities in server-side software often requires knowledge of the binary and environment, which limits the attack surface,…

Hackers Exploiting Progress WhatsUp RCE Vulnerability In The Wild
12
Sep
2024

Hackers Exploiting Progress WhatsUp RCE Vulnerability In The Wild

RCE attacks on WhatsUp Gold exploited the Active Monitor PowerShell Script to execute malicious code, as the vulnerabilities CVE-2024-6670 and…

CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World
12
Sep
2024

CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World

CosmicBeetle, a threat actor specializing in ransomware, has recently replaced its old ransomware, Scarab, with ScRansom, a custom-built ransomware that…

New Loki Backdoor Attacking macOS Systems
12
Sep
2024

New Loki Backdoor Attacking macOS Systems

Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses…

Hackers Mimic Google, Microsoft & Amazon Domains for Phishing Attacks
12
Sep
2024

Hackers Mimic Google, Microsoft & Amazon Domains for Phishing Attacks

Phishing remains a significant concern for both individuals and organizations. Recent findings from ThreatLabz have highlighted the alarming prevalence of…