A recently discovered vulnerability in Bitdefender’s GravityZone Update Server has raised significant security concerns. Identified as CVE-2024-6980, this flaw allows attackers to execute server-side request forgery (SSRF) attacks, potentially compromising sensitive data and systems. With a CVSS score of 9.2,…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Beware Of Malicious Crypto Management App That Drains Your Wallet
A forwarded Telegram video advertises heavily discounted, high-profile cryptocurrency projects, enticing viewers with links to a seemingly legitimate second-tier exchange and a concealed malicious link. Through the use of this social engineering strategy, which is intended to lull victims into…
CrowdStrike & Microsoft to Face Lawsuit from Delta Air Lines Following System Crash
Delta Air Lines has enlisted the legal expertise of David Boies, chairman of Boies Schiller Flexner, to seek damages from cybersecurity firm CrowdStrike and tech giant Microsoft. This follows a catastrophic system crash on July 19 that resulted in the…
Voice Over Wi-Fi Vulnerability Let Attackers Eavesdrop Calls And SMS
Users use Voice Over Wi-Fi (VoWiFi) quite frequently nowadays, as it’s a technology that enables them to make voice calls over a Wi-Fi network. This technology does so without relying on traditional cellular networks. Besides this, doing so allows the…
Germany has accused China of Attack on Critical Infrastructure Since 2021
Following extensive analyses and investigations by German security authorities, the Federal Government has officially attributed responsibility for a significant cyberattack on the Federal Office of Cartography and Geodesy (BKG) at the end of 2021 to Chinese state actors. The federal…
OAuth Vulnerability Exposes 1 Million Websites To XSS Attacks
Despite robust defenses, Cross-Site Scripting (XSS) remains a persistent web vulnerability, as its exploitation has become increasingly challenging. A recent discovery highlights how integrating OAuth, a modern authentication standard, with vulnerable websites can resurrect XSS risks. By manipulating OAuth flows…
World Wide Web Consortium Opposed Google’s Decision on Third-party cookies
The World Wide Web Consortium (W3C) has strongly opposed Google’s decision to halt the deprecation of third-party cookies. The W3C has updated its Technical Architecture Group (TAG) finding to emphasize the necessity of removing third-party cookies due to their inherent…
New Specula Tool Turning Outlook as a C2 Server by Leveraging Registry
Cybersecurity firm TrustedSec has unveiled a powerful new tool called Specula. It exploits a longstanding vulnerability in Microsoft Outlook to transform it into a Command and Control (C2) server. This revelation has sent shockwaves through the cybersecurity community, highlighting a…
Meta paid a $1.4 Billion Settlement for the Unauthorized Capture of Personal Biometric Data
Texas Attorney General Ken Paxton has secured a $1.4 billion settlement with Meta Platforms Inc. (formerly known as Facebook) over the unauthorized capture and use of millions of Texans’ personal biometric data. This settlement marks the largest privacy settlement ever…
Chrome Security Update: Patch for Critical Flaw that Leads to Exploitation
Google has rolled out a new security update for its Chrome browser, addressing several critical vulnerabilities. The update on the Stable channel brings Chrome to version 127.0.6533.88/89 for Windows and Mac, and 127.0.6533.88 for Linux. The update will be distributed…
Progress Patched New MOVEit File Transfer Flaw that Allows Privilege Escalation
Progress, the company behind MOVEit Transfer, has issued a critical security alert addressing a newly discovered vulnerability in its MOVEit Transfer product. The flaw, CVE-2024-6576, has been classified as a high-severity issue, with a CVSS score of 7.3, indicating a…
ubook Suffered Data Breach, 710,000 Users’ Data Exposed
The popular audiobook and podcast platform uBook has been affected by a data breach that exposed the personal information of 710,000 users. According to a tweet by ThreatMon, the breach, which occurred in July 2024, was announced by a member…
Critical OpenSSH “regreSSHion” Vulnerability Impacted macOS Systems, Patch Now
A serious flaw in OpenSSH servers, dubbed “regreSSHion,” affects macOS systems and could allow a remote attacker to execute arbitrary code. A few weeks ago, Qualys’ threat research unit discovered this vulnerability, which has been identified as regreSSHion and tracked…
Threat Actor Allegedly Claiming Hack of Microsoft Employee’s Device
A threat actor has taken to social media to claim responsibility for hacking into a Microsoft employee’s device. The announcement was made via a Telegram post, accompanied by a video purportedly showing the breach’s aftermath, as per a tweet by…
Hackers Exploiting ESXi Hypervisor Auth Bypass Flaw For Ransomware Attacks
Hackers prefer ransomware attacks primarily because they offer the highest chance of financial gain. By locking victims’ information systems and asking for payment to release them, ransomware attacks lock victims’ information systems and demand payment to unlock them. Considering such…
Proofpoint’s Email Protection Let Attackers Send Millions Of Phishing Emails
Hackers use phishing emails to mislead recipients into providing personal data like usernames, passwords, credit card numbers, or social security numbers. This method exploits human emotions and trust, allowing a threat actor to compromise an account, steal an identity, or…
SocGholish Malware Attacking Windows Users Using Fake Browser Update
The SocGholish downloader has been in operation since 2017 and it is still evolving. This malware, which poses as a browser update, is favored by multiple threat groups such as the Russian-operated Evil Corp (Manatee Tempest) and the Initial Access…
Threat Actor Allegedly Claiming Breach of Cyepr
A threat actor has allegedly claimed responsibility for breaching Cyepro Solutions, a company known for its cloud solutions tailored to the automotive sales industry. The breach, reportedly in July 2024, has potentially compromised the personal information of approximately 97,000 individuals.…
AcidPour Malware Attacking Linux Data Storage Devices To Wipe Out Data
In March 2024, a new variant of the AcidRain wiper malware dubbed “AcidPour” was noticed. It targets Linux data storage devices and permanently erases data from the targeted systems, making them inoperative. It targets crucial sectors of Linux devices such…
Hacker Attacking Bank Users With AI-powered Phishing Tools and Android Malware
Cybersecurity firm Group-IB has uncovered a sophisticated cybercrime operation targeting Spanish banking customers. The criminal group GXC Team has been using AI-powered phishing tools and Android malware to steal sensitive banking information. This article delves into the GXC Team’s operational…