A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale on a notorious hacker forum. This exploit, which has not yet been assigned a Common Vulnerabilities and Exposures (CVE) reference, is said to be capable of…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Palo Alto ZeroDay Exploited in The Wild Following PoC Release
Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified as CVE-2024-3400. This zero-day flaw, found in the GlobalProtect Gateway, is currently under active exploitation by attackers. CVE-2024-3400 allows attackers to execute arbitrary OS commands on…
Russian APT44 – The Most Notorious Cyber Sabotage Group Globally
As Russia’s invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS, APT44) cyber threat group remains highly active and increasingly integrated with Russian conventional military operations in support of Moscow’s war aims. However, Sandworm’s disruptive operations now…
FIN7 Hackers Attacking IT Employees Of Automotive Industry
IT employees in the automotive industry are often targeted by hackers because they have access to sensitive information such as customer data, intellectual property, and critical systems. The connected technologies’ dependence on the automotive industry and the value of their…
SoumniBot Exploiting Android Manifest Flaws to Evade Detection
A new banker, SoumniBot, has recently been identified. It targets Korean users and is incredible by using an unusual method to evade investigation and detection, notably obfuscating the Android manifest. In addition to its unique obfuscation, SoumniBot stands out for…
LeSlipFrancais Data Breach: Customers’ Personal Information Exposed
LeSlipFrancais, the renowned French underwear brand, has confirmed a data breach impacting its customer base. The breach, first reported by the online security platform Have I Been Pwned, has compromised the sensitive personal information of thousands of customers. The breach…
Cisco Hypershield: AI-Powered Hyper-Distributed Security for Data Center
Cisco has unveiled its latest innovation, Cisco Hypershield, marking a milestone in cybersecurity. This groundbreaking product, described as Cisco’s most consequential security solution, introduces a cloud-native, AI-powered approach to securing highly distributed, AI-scale data centers. Integrated directly into the network’s…
What is Encryption in Malware? – Understand From Basics to XOR
Malware commonly encrypts its traffic (stolen data sent to a command-and-control server) and internal strings (like URLs and configurations) to prevent security systems from recognizing malicious content. Cryptography fundamentals, classical ciphers, bitwise operations, XOR functions, and XOR cipher detection and…
Phishing-as-a-Service Platform LabHost Seized by Authorities
Authorities have dismantled LabHost, a notorious cybercrime platform that facilitated widespread phishing attacks across the globe. The crackdown on LabHost, which was founded in the UK in 2021, marks a significant victory against cybercriminal networks that have long exploited digital…
Armis Acquires AI-based Vulnerability Detection Firm Silk Security
Armis, a leading cybersecurity company, has acquired Silk Security, an AI-powered vulnerability detection firm. The acquisition comes when organizations grapple with a surge of security findings, with no scalable and automated way to prioritize and operationalize remediation. Ineffective processes and…
FGVulDet – New Vulnerability Detector to Analyze Source Code
Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent vulnerabilities. Prior studies often oversimplify the problem into binary classification tasks, which poses challenges for deep learning models to effectively learn diverse vulnerability characteristics. To address…
Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control
Security researchers at Cado Security Labs have uncovered a new variant of the Cerber ransomware targeting Linux systems. This strain of the notorious malware has been observed exploiting a recent vulnerability in the Atlassian Confluence application to gain a foothold…
North Korean Hackers Abuse DMARC To Legitimize Their Emails
DMARC is targeted by hackers as this serves to act as a preventative measure against email spoofing and phishing attempts. They compromise DMARC (Domain-based Message Authentication Reporting and Conformance) so that they can evade email authentication protocols, consequently enabling them…
L00KUPRU Ransomware Attackers discovered in the wild
A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the wild, posing a threat to unsuspecting users. The L00KUPRU ransomware is known to encrypt user files, appending the .L00KUPRU extension to the affected files. The attackers…
Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!
Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities across multiple Oracle products. This comprehensive update fixes critical flaws that could allow remote code execution, data manipulation, and unauthorized access to systems. Affected Products and…
Cisco Warns Of Massive Brute-Force Attacks Targeting VPNs & SSH Services
Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or get into systems without permission. By systematically trying various combinations of usernames and passwords, attackers can exploit weak credentials. Brute-force attacks are automated and scalable, enabling…
Outlook Login Panel Themed Phishing Attack Evaded All Antivirus Detections
Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections. The attack, designed to mimic the Outlook login panel, successfully tricking users into revealing their login credentials. Security researcher @doc_guard first reported the attack on Twitter,…
Operation MidnightEclipse: Hackers Actively Exploiting Palo Alto Networks Zero-Day Flaw
The Palo Alto Networks PAN-OS software has a critical command injection vulnerability that allows an unauthorized attacker to run arbitrary code on the firewall with root access. The vulnerability is identified as CVE-2024-3400, with a CVSS score of 10.0. Operation MidnightEclipse…
Tor Browser 13.0.14 Released – What’s New!
The Tor Project has released a new version of the Tor Browser, their secure and private web browsing tool. Tor Browser 13.0.14 includes several critical security updates and bug fixes. Key Updates in Tor Browser 13.0.14 The latest release of…
Iran Launched A Major Cyberattack Against Critical Infrastructure In Israel
Over the weekend, Iran launched missile and drone attacks on Israel, retaliating for a suspected Israeli strike on its Damascus consulate that killed 13 people last week. This escalation arises from the ongoing Israel-Iran rivalry and Israel-Palestine conflict. Cyber activities…