Category: GBHackers

FortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing
15
May
2024

FortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing

A critical vulnerability has been discovered in Fortinet’s FortiOS SSL-VPN and FortiProxy SSL-VPN. The flaw, identified as FG-IR-23-225, allows attackers…

QakBot Malware Exploiting Windows Zero-Day To Gain System Privileges
15
May
2024

QakBot Malware Exploiting Windows Zero-Day To Gain System Privileges

Hackers exploit the Windows zero-day vulnerabilities, as they offer great advantages. This means that no patches or defenses exist for…

Adobe Patches Multiple Code Execution Flaws in a Wide Range of Products
15
May
2024

Adobe Patches Multiple Code Execution Flaws in a Wide Range of Products

Adobe has addressed several critical code execution flaws across a broad spectrum of its products. This move underscores the company’s…

New Google Chrome Zero-day Exploited in the Wild, Patch Now!
15
May
2024

New Google Chrome Zero-day Exploited in the Wild, Patch Now!

Google has issued an urgent security update for its Chrome browser after discovering a zero-day vulnerability that is currently being exploited by attackers. The vulnerability, tracked as CVE-2024-4761, affects the…

Weaponized WinSCP & PuTTY
15
May
2024

Tornado Cash Developer Jailed for Laundering Billions of Dollars

A court has sentenced the developer of the cryptocurrency mixing service Tornado Cash to over five years in prison. The…

Weaponized WinSCP & PuTTY
15
May
2024

Cybersecurity Expert Jailed For Hacking 400K Smart Homes, Selling Videos

Hackers target smart homes due to the increased interconnected devices with often insufficient security measures.  Smart homes provide a wealth…

Weaponized WinSCP & PuTTY
15
May
2024

Tor Browser 13.0.15 Released: What’s New!

Tor Project has announced the release of Tor Browser 13.0.15. Available now on the Tor Browser download page and through…

Weaponized WinSCP & PuTTY
15
May
2024

New Social Engineering Attack That Delivers Black Basta Ransomware

Hackers exploit social engineering, which avoids technical security systems, by manipulating the psychology and behavior of a human being. Social…

Zscaler Test Servers Compromised
15
May
2024

Attacker Steals Customer Phone Numbers

In a concerning development for Dell Technologies, a threat actor known as Menelik has reportedly accessed and scraped sensitive customer…

Zscaler Test Servers Compromised
14
May
2024

Hackers Abuse GoTo Meeting Tool to Deploy Remcos RAT

In a sophisticated cyberattack campaign, hackers are using the online meeting platform GoToMeeting to distribute a Remote Access Trojan known…

Zscaler Test Servers Compromised
14
May
2024

Apple iTunes for Windows Flaw

iTunes has been found to have an arbitrary code execution vulnerability that might allow attackers to execute malicious code. To…

Zscaler Test Servers Compromised
14
May
2024

New Botnet Sending Millions of Weaponized Emails

The New Jersey Cybersecurity & Communications Integration Cell (NJCCIC) has detected a formidable new cyber threat. Dubbed LockBit Black, this…