Category: GBHackers

Hackers Exploiting Apache Struts2 Vulnerability to upload Malicious Payloads
16
Dec
2024

Hackers Exploiting Apache Struts2 Vulnerability to upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used open-source framework for developing Java web…

Hackers Weaponizing Microsoft Teams to Gain Remote Access
16
Dec
2024

Hackers Weaponizing Microsoft Teams to Gain Remote Access

Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams to gain remote access to victim…

New Chinese Surveillance Tool Attack Android Users Since 2017
12
Dec
2024

New Chinese Surveillance Tool Attack Android Users Since 2017

Wuhan Chinasoft Token Information Technology Co., Ltd. developed EagleMsgSpy, a surveillance tool operational since 2017, which, installed as an APK,…

Malicious ESLint Package Let Attackers Steal Data And Inject Remote Code
12
Dec
2024

Malicious ESLint Package Let Attackers Steal Data And Inject Remote Code

Cybercriminals exploited typosquatting to deploy a malicious npm package, `@typescript_eslinter/eslint`, targeting developers seeking the legitimate TypeScript ESLint plugin, which was…

Triad Nexus, Chinese Hackers Using 200,000 Domains For Widespread Cyber Attack
12
Dec
2024

Triad Nexus, Chinese Hackers Using 200,000 Domains For Widespread Cyber Attack

Researchers identified FUNNULL, a Chinese CDN, as hosting malicious content, which includes fake trading apps for financial fraud, gambling sites…

Antidot Malware Attacking Employees Android Devices To Inject Malicious Payloads
12
Dec
2024

Antidot Malware Attacking Employees Android Devices To Inject Malicious Payloads

Researchers discovered a new variant of the AntiDot banking trojan targeting Android mobile devices through a mobile-phishing (mishing) campaign, where…

A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams
12
Dec
2024

A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams

A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers can exploit Microsoft Teams to execute…

Cleo 0-day vulnerability Exploited to Deploy Malichus Malware
12
Dec
2024

Cleo 0-day vulnerability Exploited to Deploy Malichus Malware

Cybersecurity researchers have uncovered a sophisticated exploitation campaign involving a zero-day (0-day) vulnerability in Cleo file transfer software platforms. This…

GitLab Security Update, Patch for Critical Vulnerabilities
12
Dec
2024

GitLab Security Update, Patch for Critical Vulnerabilities

GitLab announced the release of critical security patches for its Community Edition (CE) and Enterprise Edition (EE). The newly released…

BadRAM Attack Breaches AMD Secure VMs with $10 Device
12
Dec
2024

BadRAM Attack Breaches AMD Secure VMs with $10 Device

Researchers have uncovered a vulnerability that allows attackers to compromise AMD’s Secure Encrypted Virtualization (SEV) technology using a $10 device….

Splunk RCE Vulnerability Let Attackers Execute Remote Code
12
Dec
2024

Splunk RCE Vulnerability Let Attackers Execute Remote Code

Splunk, the data analysis and monitoring platform, is grappling with a Remote Code Execution (RCE) vulnerability. This flaw, identified as…

Europol Shutsdown 27 DDoS Service Provider Platforms
12
Dec
2024

Europol Shutsdown 27 DDoS Service Provider Platforms

In a major international operation codenamed “PowerOFF,” Europol, collaborating with law enforcement agencies across 15 countries, has taken down 27…