Threat actors have claimed responsibility for a data breach involving Heineken employees. The news broke through a post on the social media platform tweeted by the account DarkWebInformer, which specializes in monitoring and reporting on dark web activities. Details of…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
ELLIO and ntop partnership to boost high-speed network traffic monitoring with real-time data on opportunistic scans, botnets, and mass attacks
ELLIO, a provider of real-time, highly accurate intelligence for filtering of unwanted network traffic and cybernoise, and ntop, a provider of open-source and commercial high-speed traffic monitoring applications, have announced a partnership to enhance visibility into malicious traffic originating from…
DDoS-as-a-Service Botnet Backed by Mirai Attacking Gaming Community
DDoS-as-a-Service botnets are used by hackers to facilitate the most easily and cheaply launch of devastating distributed denial-of-service (DDoS) attacks. Purposely, these botnets are made up of hacked devices that can be rented or leased to cause service disruptions or…
Hackers Weaponizing MS Office-Cracked Versions to Deliver Malware
Attackers in South Korea are distributing malware disguised as cracked software, including RATs and crypto miners, and registering themselves with the Task Scheduler to ensure persistence. Even after removing the initial malware, the Task Scheduler triggers PowerShell commands to download…
FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks
Ever since Russia’s invasion of Ukraine on February 24, 2022, there have been heavy tensions between the nations and worldwide. After this incident, Ukraine imposed an eviction and termination moratorium on utility services for unpaid debt, ending in January 2024.…
LilacSquid Hackers Attacking IT Industries To Harvest Confidential Data
Hackers target IT industries as they hold valuable data, possess critical infrastructure, and often have access to sensitive information from various sectors. Compromising IT companies can provide hackers with high-impact opportunities for espionage, financial gain, and disruption of essential services.…
Hackers Exploiting Stored XSS Vulnerabilities in WordPress Plugins
In recent cyberattacks, hackers are actively exploiting stored cross-site scripting (XSS) vulnerabilities in various WordPress plugins. According to Fastly reports, these vulnerabilities, identified as CVE-2024-2194, CVE-2023-6961, and CVE-2023-40000, are targeted due to inadequate input sanitization and output escaping, allowing attackers…
VirusTotal Celebrates 20th Anniversary, What’s Next?
VirusTotal, a leading online service for analyzing files and URLs for viruses, worms, trojans, and other malicious content, is celebrating its 20th anniversary. Since its inception in 2004, VirusTotal has become an indispensable tool for cybersecurity professionals and enthusiasts worldwide.…
Beware of Fake Browser Updates That Deliver Bitrat & Lumma Stealer
eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign involving fake browser updates. This campaign has been responsible for delivering two dangerous malware variants:BitRAT and Lumma Stealer. The attackers use fake update mechanisms to trick users into downloading malicious…
Progress Telerik Report Server Flaw Let Attackers Bypass Authentication
A new vulnerability related to authentication bypass was discovered in the Progress Telerik Report server. The CVE for this vulnerability has been assigned CVE-2024-4358, and its severity has been given as 9.8 (Critical). This vulnerability exists in Telerik Report Server…
CryptoChameleon Kit With Group of Tools Propagate Phishing Quickly into Infrastructure
CryptoChameleon, a phishing tool detected in February 2024, was developed by someone anonymous and is used by threat actors to collect personal data such as usernames and passwords of mobile phone users. A thorough investigation has exposed many CryptoChameleon fast-flux…
Spring Cloud Data Flow Let Attackers Compromise The Server
A critical vulnerability has been discovered in Spring Cloud Data Flow, a microservices-based platform for streaming and batch data processing in Cloud Foundry and Kubernetes. The flaw, identified in the Skipper server component, allows attackers to compromise the server by…
Okta Warns Credential Stuffing Attacks Targeting Customer Identity Cloud
Okta, a leading identity and access management company, has warned about credential stuffing attacks targeting its Customer Identity Cloud (CIC). The company has identified that threat actors are exploiting the cross-origin authentication feature within CIC. As part of its Okta…
Hackers Claiming Shell Data Breach On Popular Hacking Forum
In a shocking revelation, a threat actor has allegedly leaked sensitive data belonging to Shell, one of the world’s leading energy companies. According to a tweet from Data Web Informer, the May 2024 data was posted on a popular hacking…
Researchers Exploited Nexus Repository Using Directory Traversal Vulnerability
Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes. The widespread use of GitHub and the diverse range of codebases hosted on the platform make it an attractive target for threat actors seeking valuable information…
DDNS Service In Fortinet Or QNAP Embedded Devices Exposes Sensitive Data, Researchers Warn
Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting malware through harmful sites, and flooding DNS servers with fake requests such as DDoS. DNS is everywhere and is a basic part of internet communication, making…
CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily
Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS) attacks are actively exploited by hackers. Sometimes, DDoS attacks are used as a distraction from other criminal activities, for extortion, to gain a competitive advantage, or…
PoC Exploit Released For macOS Privilege Escalation Vulnerability
A new vulnerability has been discovered in macOS Sonoma that is associated with privilege escalation. This vulnerability has been assigned with CVE-2024-27842 and the severity is yet to be categorized. This vulnerability exists in the Universal Disk Format (UDF) filesystem…
GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials
GNOME desktop manager was equipped with a new feature which allowed remote users to create graphical sessions on the system by configuring the system daemon. This daemon runs as a dedicated “gnome-remote-desktop” and also provides a D-bus interface on the…
Kesakode: A Remote Hash Lookup Service To Identify Malware Samples
Today marks a significant milestone for Malcat users with the release of version 0.9.6, introducing Kesakode, a remote hash lookup service. This innovative tool is tightly integrated into Malcat’s UI and is designed to match known functions, strings, and constant…