Category: GBHackers

PoC Exploit Released for Critical Windows LDAP RCE Vulnerability
02
Jan
2025

PoC Exploit Released For Critical Windows LDAP RCE Vulnerability

The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers, as a zero-click exploit leverages this…

Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys
02
Jan
2025

Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys

A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11 (version 24H2) by extracting full volume…

Trend Micro Apex One Vulnerabilities Let Escalate Privilege
02
Jan
2025

Trend Micro Apex One Vulnerabilities Let Escalate Privilege

72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…

Browser Extension to Detect HTML Smuggling Attacks
02
Jan
2025

Browser Extension to Detect HTML Smuggling Attacks

SmuggleShield, a recently launched browser extension, is gaining attention in the cybersecurity space for its innovative approach to mitigating HTML…

EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials
02
Jan
2025

EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials

Cloud security researchers have uncovered alarming trends in identity compromises within Amazon Web Services (AWS) environments. Among the most prolific…

One of several selfies on the Facebook page of Cameron Wagenius.
02
Jan
2025

US Army soldier Arrested for Allegedly Selling Customer Call Records From AT&T & Verizon

A 20-year-old U.S. Army soldier, Cameron John Wagenius, has been arrested and indicted by federal authorities for allegedly selling confidential…

D-Link Warns of Botnets Exploiting End-of-Life Routers
02
Jan
2025

D-Link Warns of Botnets Exploiting End-of-Life Routers

D-Link warned users of several legacy router models about known vulnerabilities actively exploited by botnets. These devices, which have reached…

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military
01
Jan
2025

New Stealthy Malware Leveraging SSH Over TOR Attacking Ukrainian Military

Researchers recently discovered a malicious campaign targeting Ukrainian military personnel through fake “Army+” application websites, which host a malicious installer…

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely
01
Jan
2025

DrayTek Devices Vulnerability Let Attackers Arbitrary Commands Remotely

The DrayTek Gateway devices, more specifically the Vigor2960 and Vigor300B models, are susceptible to a critical command injection vulnerability.  Exploitable…

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates
31
Dec
2024

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Microsoft has issued a warning about a significant issue impacting devices running Windows 11, version 24H2, that could block essential…

PoC Exploited Released for Oracle Weblogic Server Vulnerability
31
Dec
2024

PoC Exploited Released for Oracle Weblogic Server Vulnerability

Security researchers have warned that a Proof-of-Concept (PoC) exploit has been publicly released for a critical vulnerability affecting Oracle WebLogic…

7-Zip 0-Day Exploit Leaked Online Allows Attackers Control Victim Devices Remotely
31
Dec
2024

7-Zip 0-Day Exploit Leaked Online Allows Attackers Control Victim Devices Remotely

A previously unknown zero-day vulnerability in the popular file compression tool 7-Zip has been publicly disclosed by an anonymous user…