Category: GBHackers

Spring Framework Path Traversal Vulnerability (CVE-2024-38819) PoC Exploit Released
18
Dec
2024

Spring Framework Path Traversal Vulnerability (CVE-2024-38819) PoC Exploit Released

A Proof of Concept (PoC) exploit for the critical path traversal vulnerability identified as CVE-2024-38819 in the Spring Framework has…

Multiple SHARP Routers Vulnerabilities Let Attackers Execute Arbitrary Code
18
Dec
2024

Multiple SHARP Routers Vulnerabilities Let Attackers Execute Arbitrary Code

Multiple vulnerabilities have been identified in SHARP routers, potentially allowing attackers to execute arbitrary code with root privileges or compromise…

Hackers Attacking Linux SSH Servers DDoS bot cShell Using screen & hping3 Tools
18
Dec
2024

Hackers Attacking Linux SSH Servers DDoS bot cShell Using screen & hping3 Tools

The AhnLab Security Intelligence Center (ASEC) has detected a new strain of malware targeting poorly protected Linux SSH servers. This…

CISA Releases Secure Practices for Microsoft 365 Cloud Services
18
Dec
2024

CISA Releases Secure Practices for Microsoft 365 Cloud Services

The Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 25-01: Implementing Secure Practices for Cloud Services,…

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads
17
Dec
2024

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files to infiltrate systems with backdoor malware….

17
Dec
2024

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences Center El Paso (TTUHSC El Paso),…

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers
17
Dec
2024

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a typically harmless security feature, to launch…

17
Dec
2024

Kali Linux 2024.4 Released – What’s New!

Kali Linux has unveiled its final release for 2024, version Kali Linux 2024.4, packed with notable updates, including new tools…

ConnectOnCall Data Breach, 900,000 Customers Data Exposed
17
Dec
2024

ConnectOnCall Data Breach, 900,000 Customers Data Exposed

 The healthcare communication platform ConnectOnCall, operated by ConnectOnCall.com, LLC, has confirmed a significant data breach that compromised the personal information…

Hitachi Authentication bypass Vulnerability Allows Attackers to Hack the System Remotely
17
Dec
2024

Hitachi Authentication bypass Vulnerability Allows Attackers to Hack the System Remotely

Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer. A severe vulnerability has been discovered…

CISA Warns of Adobe & Windows Kernel Driver Exploited in Attacks
17
Dec
2024

CISA Warns of Adobe & Windows Kernel Driver Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two significant vulnerabilities to its Known Exploited…

New Research Uncovered Dark Internet Service Providers Used For Hacking
16
Dec
2024

New Research Uncovered Dark Internet Service Providers Used For Hacking

Bulletproof hosting services, a type of dark internet service provider, offer infrastructure to cybercriminals, facilitating malicious activities like malware distribution,…