Category: GBHackers

Browser Extension to Detect HTML Smuggling Attacks
02
Jan
2025

Browser Extension to Detect HTML Smuggling Attacks

SmuggleShield, a recently launched browser extension, is gaining attention in the cybersecurity space for its innovative approach to mitigating HTML…

EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials
02
Jan
2025

EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials

Cloud security researchers have uncovered alarming trends in identity compromises within Amazon Web Services (AWS) environments. Among the most prolific…

One of several selfies on the Facebook page of Cameron Wagenius.
02
Jan
2025

US Army soldier Arrested for Allegedly Selling Customer Call Records From AT&T & Verizon

A 20-year-old U.S. Army soldier, Cameron John Wagenius, has been arrested and indicted by federal authorities for allegedly selling confidential…

D-Link Warns of Botnets Exploiting End-of-Life Routers
02
Jan
2025

D-Link Warns of Botnets Exploiting End-of-Life Routers

D-Link warned users of several legacy router models about known vulnerabilities actively exploited by botnets. These devices, which have reached…

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military
01
Jan
2025

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake “Army+” application websites, which host a malicious installer…

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely
01
Jan
2025

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a critical command injection vulnerability.  Exploitable…

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates
31
Dec
2024

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Microsoft has issued a warning about a significant issue impacting devices running Windows 11, version 24H2, that could block essential…

PoC Exploited Released for Oracle Weblogic Server Vulnerability
31
Dec
2024

PoC Exploited Released for Oracle Weblogic Server Vulnerability

Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for a critical vulnerability affecting Oracle WebLogic…

7-Zip 0-Day Exploit Leaked Online Allows Attackers Control Victim Devices Remotely
31
Dec
2024

7-Zip 0-Day Exploit Leaked Online Allows Attackers Control Victim Devices Remotely

A previously unknown zero-day vulnerability in the popular file compression tool 7-Zip has been publicly disclosed by an anonymous user…

SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach
31
Dec
2024

SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach

SquareX, an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported…

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild
31
Dec
2024

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a critical vulnerability in Palo Alto…

NFS Protocol Security Bypassed To Access Files From Remote Server
31
Dec
2024

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and Kerberos, providing cryptographic verification.  While…