Category: GBHackers

VMware Workstation & Fusion Now Available for Free to All Users - GBHackers Security
12
Nov
2024

VMware Workstation & Fusion Now Available for Free to All Users – GBHackers Security

VMware has announced that its popular desktop hypervisor products, VMware Workstation and VMware Fusion, are now free to all users…

Dell Enterprise SONiC Flaw Let Attackers Hijack the System - GBHackers Security
12
Nov
2024

Dell Enterprise SONiC Flaw Let Attackers Hijack the System – GBHackers Security

Dell Technologies has disclosed multiple critical security vulnerabilities in its Enterprise SONiC OS, which could allow attackers to gain control…

Amazon Confirms Employee Data Breach Via Third-party Vendor - GBHackers Security
12
Nov
2024

Amazon Confirms Employee Data Breach Via Third-party Vendor – GBHackers Security

Amazon has confirmed that sensitive employee data was exposed due to a breach at a third-party vendor. The breach arose…

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace
11
Nov
2024

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments Sweet Security today announced the…

New Android Malware SpyAgent Taking Screenshots Of Users Devices
11
Nov
2024

New Android Malware SpyAgent Taking Screenshots Of Users Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices. …

Researchers Detailed Credential Abuse Cycle
11
Nov
2024

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them to gain unauthorized access. This…

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays
11
Nov
2024

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse complaints and temporary disruptions. While…

Metasploit Framework Released with New Features
11
Nov
2024

Metasploit Framework Released with New Features

The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced an exciting new release packed…

CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks
08
Nov
2024

CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns organizations of a critical vulnerability in Palo Alto Networks’ Expedition tool,…

Cisco Desk Phone Series Vulnerability Let Remote Attacker Access sensitive information
07
Nov
2024

Cisco Desk Phone Series Vulnerability Let Remote Attacker Access sensitive information

A significant vulnerability (CVE-2024-20445) has been discovered in Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and…

Cisco Flaw Let Attackers Run Command as Root User
07
Nov
2024

Cisco Flaw Let Attackers Run Command as Root User

A critical vulnerability has been discovered in Cisco Unified Industrial Wireless Software, which affects Cisco Ultra-Reliable Wireless Backhaul (URWB) Access…

HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data
06
Nov
2024

HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data

The HookBot malware family employs overlay attacks to trick users into revealing sensitive information by impersonating various brands and apps…