Category: GBHackers

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack
25
Dec
2024

IBM AIX TCP/IP Vulnerability Lets Attackers Exploit to Launch Denial of Service Attack

IBM has issued a security bulletin warning of two vulnerabilities in its AIX operating system that could potentially lead to…

Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server
25
Dec
2024

Apache Auth-Bypass Vulnerability Lets Attackers Gain Control Over HugeGraph-Server

The Apache Software Foundation has issued a security alert regarding a critical vulnerability in Apache HugeGraph-Server. The flaw, identified as…

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks
24
Dec
2024

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions of systems to potential remote…

New Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver Malware
23
Dec
2024

New Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver Malware

Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT…

Hackers Exploiting PLC Controllers In US Water Management System To Gain Remote Access
23
Dec
2024

Hackers Exploiting PLC Controllers In US Water Management System To Gain Remote Access

A joint Cybersecurity Advisory (CSA) warns of ongoing exploitation attempts by Iranian Islamic Revolutionary Guard Corps (IRGC)-affiliated cyber actors using…

DigiEver IoT Devices Exploited To Deliver Mirai-based Malware
23
Dec
2024

DigiEver IoT Devices Exploited To Deliver Mirai-based Malware

A new Mirai-based botnet, “Hail Cock Botnet,” has been exploiting vulnerable IoT devices, including DigiEver DVRs and TP-Link devices with…

New Python NodeStealer Attacking Facebook Business To Steal Login Credentials
23
Dec
2024

New Python NodeStealer Attacking Facebook Business To Steal Login Credentials

NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets Facebook Ads Manager accounts, stealing…

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications
23
Dec
2024

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, “BMI CalculationVsn,” was found on the Amazon App Store, which secretly collected sensitive user data,…

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques
23
Dec
2024

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial sample (MD5 14f6c034af7322156e62a6c961106a8c) provided valuable…

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware
23
Dec
2024

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate…

Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide
23
Dec
2024

Lazarus Hackers Using New VNC Based Malware To Attack Organizations Worldwide

The Lazarus Group has recently employed a sophisticated attack, dubbed “Operation DreamJob,” to target employees in critical sectors like nuclear…

North Korean Hackers Stolen $2.2 Billion from Crypto Platforms in 2024
23
Dec
2024

North Korean Hackers Stolen $2.2 Billion from Crypto Platforms in 2024

North Korean hackers are estimated to have stolen a staggering $2.2 billion in 2024, up 21% from 2023. With advanced…