Category: GBHackers

Ollama AI Remote Code Execution Flaw
27
Jun
2024

TP-Link Omada Vulnerabilities – Attackers Execute Remote Code

Multiple vulnerabilities have been identified in the TP-Link Omada system, a software-defined networking solution widely used by small to medium-sized…

Ollama AI Remote Code Execution Flaw
27
Jun
2024

BSNL Data Breach Exposes Millions of Users to Fraud and Security Risks

Bharat Sanchar Nigam Limited (BSNL), India’s state-owned telecommunications provider, has suffered a major data breach orchestrated by a threat actor…

P2Pinfect Redis Server with New Ransomware Payload
26
Jun
2024

P2Pinfect Redis Server with New Ransomware Payload

Cybersecurity researchers have identified a new ransomware payload associated with the P2Pinfect malware, primarily targeting Redis servers. This sophisticated malware,…

FireTail Unveils Free Access for All to Cutting-Edge API Security PlatformFireTail Unveils Free Access for All to Cutting-Edge API Security Platform
26
Jun
2024

Ollama AI Platform Flaw Let Attackers Execute Remote Code

⁤Hackers attack AI infrastructure platforms since these systems contain a multitude of valuable data, algorithms that are sophisticated in nature,…

Ollama AI Remote Code Execution Flaw
26
Jun
2024

OilRig Hackers Attacking Individuals And Organizations In The Middle East

OilRig is an Iranian-linked cyber espionage group that has been active since 2015, and this group is known for its…

FireTail Unveils Free Access for All to Cutting-Edge API Security PlatformFireTail Unveils Free Access for All to Cutting-Edge API Security Platform
26
Jun
2024

New North Korean Actor Distributing Malicious NPM Packages To Compromise Organizations

Early in 2024, North Korean threat actors persisted in using the public npm registry to disseminate malicious packages that were…

FireTail Unveils Free Access for All to Cutting-Edge API Security Platform
26
Jun
2024

FireTail Unveils Free Access for All to Cutting-Edge API Security Platform

FireTail announces a free version of its enterprise-level API security tools, making them accessible to developers and organizations of all…

Microsoft Announced Copilot for Security TI in Defender XDR
26
Jun
2024

Microsoft Announced Copilot for Security TI in Defender XDR

Microsoft has announced the general availability of Copilot for Security threat intelligence embedded experience in the Defender XDR portal. This…

Critical Vulnerability in MOVEit Transfer Let Hackers Gain Full Files Access
26
Jun
2024

Critical Vulnerability in MOVEit Transfer Let Hackers Gain Full Files Access

A critical security vulnerability, CVE-2024-5806, has been identified in MOVEit Transfer, a widely used managed file transfer software. The vulnerability poses significant risks to…

Beware Of Shorten URLs With Word Files That Install Remcos RAT
25
Jun
2024

Beware Of Shorten URLs With Word Files That Install Remcos RAT

A new method of distributing the Remcos Remote Access Trojan (RAT) has been identified. This malware, known for providing attackers…

Hackers Use Windows XSS Flaw To Execute Arbitrary Command
25
Jun
2024

Hackers Use Windows XSS Flaw To Execute Arbitrary Command

Attackers are leveraging a new infection technique called GrimResource that exploits MSC files. By crafting malicious MSC files, they can…

New Webkit Vulnerabilities Let Attackers Exploit PS4 And PS5 Playstations
25
Jun
2024

New Webkit Vulnerabilities Let Attackers Exploit PS4 And PS5 Playstations

Webkit vulnerabilities in PS4 and PS5 refer to bugs found in the Webkit engine used by their web browsers. These…