Category: GBHackers

Microsoft Patch Tuesday : 149 Vulnerabilities Fixed
10
Apr
2024

Brute-Force SSH Attacks Rampant in the Wild

A comprehensive four-year study of brute-force attacks against SSH servers has revealed an alarming increase in the frequency and sophistication…

Cypago Announces New Automation Support for AI Security and Governance
10
Apr
2024

Beware of Encrypted Phishing Attack With Weaponized SVG Files

Attackers are now leveraging encrypted phishing emails that utilize Scalable Vector Graphics (SVG) files to execute malicious JavaScript code. The…

Microsoft Patch Tuesday : 149 Vulnerabilities Fixed
10
Apr
2024

Cypago Announces New Automation Support for AI Security and Governance

Cyber GRC software company Cypago has announced a new automation solution for artificial intelligence (AI) governance, risk management and compliance….

Microsoft Patch Tuesday : 149 Vulnerabilities Fixed
10
Apr
2024

Flaws in 90k+ LG WebOS TVs

Bitdefender, the cybersecurity firm, has unveiled a series of critical vulnerabilities in LG’s WebOS TVs, affecting over 91,000 devices worldwide….

149 Security Vulnerabilities & Zero-days
10
Apr
2024

149 Security Vulnerabilities & Zero-days

On April Patch Tuesday, Microsoft fixed 149 bugs—one of the biggest security update releases in the company’s history.  Many of…

RUBYCARP the SSH Brute Botnet Resurfaces With New Tools
10
Apr
2024

RUBYCARP the SSH Brute Botnet Resurfaces With New Tools

The cybersecurity community is again on high alert as the notorious botnet group RUBYCARP, known for its SSH brute force…

Critical Rust Flaw Let Attackers Inject Commands on Windows
10
Apr
2024

Critical Rust Flaw Let Attackers Inject Commands on Windows

A new critical vulnerability has been discovered in two of the Rust standard libraries, which could allow a threat actor…

Google Adds V8 Sandbox
10
Apr
2024

New SharePoint Technique Lets Hackers Bypass Security

Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without triggering…

How to Use Cyber Threat Intelligence ? 4 TI Categories
10
Apr
2024

How to Use Cyber Threat Intelligence ? 4 TI Categories

Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…

Google Adds V8 Sandbox
10
Apr
2024

D-Link RCE Vulnerability (CVE-2024-3273) Exploited in Wild

Cybercriminals have actively exploited a critical vulnerability in D-Link Network Attached Storage (NAS) devices globally. Identified as CVE-2024-3273, this remote…

How to Use Cyber Threat Intelligence ? 4 TI Categories
09
Apr
2024

How to Use Cyber Threat Intelligence ? 4 TI Categories

Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…

Cyber Attack on Consulting Firm Expose DOJ Data of 341k People
09
Apr
2024

Cyber Attack on Consulting Firm Expose DOJ Data of 341k People

Greylock McKinnon Associates, a prominent consulting firm, has reported a cyber attack that exposed personal data belonging to 341,000 individuals,…