Category: GBHackers

Google Adds V8 Sandbox
10
Apr
2024

New SharePoint Technique Lets Hackers Bypass Security

Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without triggering…

How to Use Cyber Threat Intelligence ? 4 TI Categories
10
Apr
2024

How to Use Cyber Threat Intelligence ? 4 TI Categories

Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…

Google Adds V8 Sandbox
10
Apr
2024

D-Link RCE Vulnerability (CVE-2024-3273) Exploited in Wild

Cybercriminals have actively exploited a critical vulnerability in D-Link Network Attached Storage (NAS) devices globally. Identified as CVE-2024-3273, this remote…

How to Use Cyber Threat Intelligence ? 4 TI Categories
09
Apr
2024

How to Use Cyber Threat Intelligence ? 4 TI Categories

Cyber Threat Intelligence (CTI) is a process that actively gathers and analyzes information on potential cyber threats, including Indicators of…

Cyber Attack on Consulting Firm Expose DOJ Data of 341k People
09
Apr
2024

Cyber Attack on Consulting Firm Expose DOJ Data of 341k People

Greylock McKinnon Associates, a prominent consulting firm, has reported a cyber attack that exposed personal data belonging to 341,000 individuals,…

Ahoi Attacks - New Attack Breaking VMs With Malicious Interrupts
09
Apr
2024

Ahoi Attacks – New Attack Breaking VMs With Malicious Interrupts

Ahoy, which is often associated with communicating to ships, has now been playfully adopted in pirate language. We coin ‘Ahoi,’…

Hackers Using ScrubCrypt 'AV Evasion Tool' Exploit Oracle Servers
09
Apr
2024

Hackers Using ScrubCrypt ‘AV Evasion Tool’ Exploit Oracle Servers

Hackers exploit Oracle WebLogic Servers, knowing that they are extensively used in enterprises. Threat actors can use security vulnerabilities present…

Google Adds V8 Sandbox To Chrome To Fight Against Browser Attacks
09
Apr
2024

Google Adds V8 Sandbox To Chrome To Fight Against Browser Attacks

A Sandbox is a protective medium that blocks the entire system from any application accessing vulnerable resources.  Restrictive environments for…

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable
09
Apr
2024

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable

In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant…

Attackers Gain Access to File Servers
09
Apr
2024

Attackers Gain Access to File Servers

Targus International, LLC and its affiliates fell victim to a sophisticated cyberattack. The company, an indirect subsidiary of B. Riley…

Notepad++ Wants Your Help to Take Down the Parasite Website
09
Apr
2024

Notepad++ Wants Your Help to Take Down the Parasite Website

In a recent announcement, the team behind the widely acclaimed source code editor, Notepad++, has issued a call to arms…

Top Israeli Spy Chief Identity Exposed In A Privacy Mistake
09
Apr
2024

Top Israeli Spy Chief Identity Exposed In A Privacy Mistake

Privacy mistakes could pose a serious threat to sensitive information or systems,, which threat actors could exploit for their gain….