Category: GBHackers

SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach
31
Dec
2024

SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach

SquareX, an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About a week ago, SquareX reported…

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild
31
Dec
2024

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a critical vulnerability in Palo Alto…

NFS Protocol Security Bypassed To Access Files From Remote Server
31
Dec
2024

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and Kerberos, providing cryptographic verification.  While…

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File
31
Dec
2024

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

The watering hole attack leverages a compromised website to deliver malware. When a user visits the infected site, their system…

US Treasury Department Breach, Hackers Accessed Workstations
31
Dec
2024

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department, gaining unauthorized access to employee…

New Botnet Exploiting D-Link Routers To Gain Control Remotely
31
Dec
2024

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the “FICORA” and “CAPSAICIN,” both variants of Mirai and Kaiten, respectively, which…

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code
31
Dec
2024

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a critical vulnerability in TrueNAS CORE,…

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks
27
Dec
2024

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto Networks’ PAN-OS software. This flaw…

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern
27
Dec
2024

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in the cybersecurity community. This notorious…

New 'OtterCookie' Malware Attacking Software Developers Via Fake Job Offers
27
Dec
2024

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack targeting various organizations, unlike typical…

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers
27
Dec
2024

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised EXE installer, as analysis revealed…

North Korean Hackers Stolen $2.2 Billion from Crypto Platforms in 2024
26
Dec
2024

North Korean Hackers Stolen $2.2 Billion From Crypto Platforms In 2024

Cryptocurrency hacking incidents in 2024 surged 21.07% YoY to $2.2 billion, with 303 breaches reported, which marks the fifth year…