Category: GBHackers

Linux Malware perfctl Attacking Millions of Linux Servers
04
Oct
2024

Linux Malware perfctl Attacking Millions of Linux Servers

Researchers have uncovered a sophisticated Linux malware, dubbed “perfctl,” actively targeting millions of Linux servers worldwide. This malicious software exploits…

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP
03
Oct
2024

Attack Surface Management to the Rescue – Find, Fix, Fortify Your ASM with Criminal IP

Decoding Compliance | What CISOs Need to Know Non-compliance can result in substantial financial penalties, with average fines reaching up…

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions
03
Oct
2024

SquareX Shows How Malicious Extensions Bypass Google’s MV3 Restrictions

At DEF CON 32, the SquareX research team delivered a hard-hitting presentation titled Sneaky Extensions: The MV3 Escape Artists where…

Doppler Launches 'Change Requests' to Strengthen Secrets Management Security with Audited Approvals
03
Oct
2024

Doppler Launches ‘Change Requests’ to Strengthen Secrets Management Security with Audited Approvals

Doppler, the leading platform in secrets management, today announces the launch of Change Requests, a new feature providing engineering teams…

Northern Ireland police to Pay £750,000 fine Following Data Breach
03
Oct
2024

Northern Ireland police to Pay £750,000 fine Following Data Breach

The Police Service of Northern Ireland (PSNI) has been ordered to pay a £750,000 fine following a significant data breach…

ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats - GBHackers Security
03
Oct
2024

ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats – GBHackers Security

ANY.RUN announced an upgrade to its Threat Intelligence Portal, enhancing its capabilities to identify and analyze emerging cyber threats. This…

Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber Attacks
03
Oct
2024

Hackers Now Exploit Ivanti Endpoint Manager Vulnerability to Launch Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new vulnerability to its Known Exploited Vulnerabilities…

Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems
03
Oct
2024

Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems

A critical vulnerability has been discovered in Cisco’s Nexus Dashboard Fabric Controller (NDFC), potentially allowing hackers to execute arbitrary commands…

Tor Browser 13.5.6 Released - What's New!
03
Oct
2024

Tor Browser 13.5.6 Released – What’s New!

The Tor Project has announced the release of Tor Browser 13.5.6, which is now available for download from its official…

Mario Duarte, Former Snowflake Cybersecurity Leader, Joins Aembit as CISO to Tackle Non-Human Identities
02
Oct
2024

Mario Duarte, Former Snowflake Cybersecurity Leader, Joins Aembit as CISO to Tackle Non-Human Identities

Aembit, the non-human IAM company, today announced the appointment of Mario Duarte as chief information security officer (CISO). Duarte, formerly…

Bluetooth Vulnerability
02
Oct
2024

New Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairing

A recently discovered vulnerability in Bluetooth technology has raised significant security concerns. This flaw could allow hackers to intercept passcodes…

A Cyber Security Tool for Red Team to Evade Detection
02
Oct
2024

A Cyber Security Tool for Red Team to Evade Detection

The need for advanced tools that can effectively simulate real-world threats is paramount. Enter GhostStrike, a sophisticated cybersecurity tool explicitly…