Category: GBHackers

Apache Solr For Windows instances Vulnerability Allows Arbitrary Path Write-Access
27
Jan
2025

Apache Solr For Windows instances Vulnerability Allows Arbitrary Path Write-Access

A critical security vulnerability (CVE-2024-52012) affecting Apache Solr instances on Windows has been identified, allowing attackers to gain arbitrary file…

11-Day Timeline from Initial Compromise to Deployment
27
Jan
2025

11-Day Timeline from Initial Compromise to Deployment

A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across a corporate environment. The attack,…

Weaponised XWorm RAT builder Attacking script kiddies to Steal Sensitive Data
27
Jan
2025

Weaponised XWorm RAT builder Attacking script kiddies to Steal Sensitive Data

A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan (RAT) builder has compromised over 18,000…

Burp Suite 2025.1 Released, What’s New!
27
Jan
2025

Burp Suite 2025.1 Released, What’s New!

Burp Suite 2025.1, is packed with new features and enhancements designed to improve your web application testing workflow. This latest…

Chrome Security Update - Patch for 3 High-Severity Vulnerabilities
27
Jan
2025

Chrome Security Update – Patch for 3 High-Severity Vulnerabilities

Google has released a critical update for the Chrome browser, addressing three high-severity security vulnerabilities. This patch, part of the…

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials
27
Jan
2025

Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare’s workers.dev, a free domain name service, to execute credential theft campaigns….

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel
27
Jan
2025

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel

 A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could potentially lead to privilege escalation in…

Researchers Exploited Windows Charset Conversion Feature to Execute Remote Code
27
Jan
2025

Researchers Exploited Windows Charset Conversion Feature to Execute Remote Code

Researchers have exposed a systemic vulnerability within the Windows operating system, leveraging its “Best-Fit” charset conversion feature to bypass security…

GitLab Security Update - Patch for Multiple Vulnerabilities
27
Jan
2025

GitLab Security Update – Patch for Multiple Vulnerabilities

Free Webinar – DevSecOps Hacks By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes,…

Critical Vulnerability in Meta Llama Framework Let Remote Attackers Execute Arbitrary Code
27
Jan
2025

Critical Vulnerability in Meta Llama Framework Let Remote Attackers Execute Arbitrary Code

The Oligo Research team has disclosed a critical vulnerability in Meta’s widely used Llama-stack framework. This vulnerability, tracked as CVE-2024-50050, allows…

INE Security Alert: Expediting CMMC 2.0 Compliance - GBHackers Security
26
Jan
2025

INE Security Alert: Expediting CMMC 2.0 Compliance – GBHackers Security

Free Webinar – DevSecOps Hacks By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes,…

370+Ivanti Connect Secure Exploited Using 0-Day Vulnerability
24
Jan
2025

370+Ivanti Connect Secure Exploited Using 0-Day Vulnerability

A major cybersecurity incident has come to light, with more than 370 Ivanti Connect Secure (ICS) devices reportedly compromised through…