Category: GBHackers

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild
05
Dec
2024

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being actively exploited in the wild. The…

New TLDs Such as .shop, .top and .xyz Leveraged by Phishers
04
Dec
2024

New TLDs Such as .shop, .top and .xyz Leveraged by Phishers

Phishing attacks have surged nearly 40% in the year ending August 2024, with a significant portion of this increase linked…

Google Chrome Security Update, Patch for High-severity Vulnerability
04
Dec
2024

Google Chrome Security Update, Patch for High-severity Vulnerability

Google has released a significant security update for its Chrome browser, aiming to address several vulnerabilities and enhance user safety….

Progress WhatsUp Gold RCE Vulnerability
04
Dec
2024

Progress WhatsUp Gold RCE Vulnerability

A registry overwrite remote code execution (RCE) vulnerability has been identified in NmAPI.exe, part of the WhatsUp Gold network monitoring…

MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts
04
Dec
2024

MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts

A critical vulnerability has been identified in the Mobile Security Framework (MobSF) that allows attackers to inject malicious scripts into…

CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors
04
Dec
2024

CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors

The National Security Agency (NSA) has partnered with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation…

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration
03
Dec
2024

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By manipulating its capabilities, attackers can execute…

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms
03
Dec
2024

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target e-commerce platforms during the holiday season,…

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts
03
Dec
2024

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated learning (FL) to improve the efficiency…

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform
03
Dec
2024

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation platform. Alleged by a tweet from…

Salesforce Applications Vulnerability Could Allow Full Account Takeover
03
Dec
2024

Salesforce Applications Vulnerability Could Allow Full Account Takeover

A critical vulnerability has been discovered in Salesforce applications that could potentially allow a full account takeover. The vulnerability, uncovered…

TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands
03
Dec
2024

TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands

A significant vulnerability has been identified in TP-Link’s HomeShield function, affecting a range of their devices, including the Archer, Deco,…