Aggregator
CVE-2008-4525 | AmpJuke 0.7.5 index.php special sql injection (EDB-32461 / XFDB-45665)
Google Buys Wiz in $32bn Cloud Security Push
Stealthy StilachiRAT steals data, may enable lateral movement
While still not widely distributed, a new Windows remote access trojan (RAT) dubbed StilachiRAT is a serious threat. “[The malware] demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data,” Microsoft threat analysts have warned on Monday. The StilachiRAT StilachiRAT’s capabilities include: Collection of information that helps paint a picture of the target system: OS/system info, hardware identifiers, BIOS serial number, camera presence, active Remote Desktop Protocol (RDP) sessions, software … More →
The post Stealthy StilachiRAT steals data, may enable lateral movement appeared first on Help Net Security.
New BitM Attack Enables Hackers to Hijack User Sessions in Seconds
A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which allows hackers to hijack user sessions across various web applications in a matter of seconds. This method exploits the inherent functionalities of web browsers to deceive victims into believing they are interacting with a secure connection, while […]
The post New BitM Attack Enables Hackers to Hijack User Sessions in Seconds appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2011-5049 | MySQL 5.5.8 resource management (EDB-18269 / XFDB-71965)
Hackers Exploit Hard Disk Image Files to Deploy VenomRAT
In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware, exploiting a novel technique to bypass security measures. This campaign begins with a phishing email that uses a purchase order as a lure, enticing users to open an attached archive file. Upon extraction, the archive […]
The post Hackers Exploit Hard Disk Image Files to Deploy VenomRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
哈佛对年收入 20 万美元以内家庭免除学费
CVE-2015-5075 | X2Engine X2CRM up to 5.1 index.php/users/create cross-site request forgery (ID 133718 / EDB-38321)
New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking
New Sophisticated Phishing Attack Exploiting Microsoft 365 Infrastructure To Attack Users
A sophisticated new phishing campaign has been discovered that exploits Microsoft 365’s legitimate infrastructure to conduct highly convincing credential harvesting and account takeover attempts. Unlike traditional phishing attempts that rely on lookalike domains or email spoofing, this attack leverages Microsoft’s own trusted systems to bypass security controls and deceive users. The attack utilizes Microsoft’s legitimate […]
The post New Sophisticated Phishing Attack Exploiting Microsoft 365 Infrastructure To Attack Users appeared first on Cyber Security News.
Over 16.8 Billion Records Exposed as Data Breaches Increase 6%
ReliaQuest Sponsors Valspar Championship Youth Clinic to Raise Awareness of Cybersecurity
Bybit Hack: Details of Sophisticated Multi-Stage Attack Uncovered
The Bybit hack, which occurred on February 21, 2025, has been extensively analyzed by multiple cybersecurity teams, including Sygnia. This attack exposed significant security vulnerabilities across various domains, including macOS malware, AWS cloud compromise, application security, and smart contract security. The incident involved unauthorized activity in Bybit’s Ethereum (ETH) cold wallets, where an ETH multisig […]
The post Bybit Hack: Details of Sophisticated Multi-Stage Attack Uncovered appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Use DLL Side-Loading to Deploy Malicious Python Code
A recent discovery by Xavier Mertens, a senior handler at the Internet Storm Center, has highlighted a sophisticated attack where hackers utilize DLL side-loading to deploy malicious Python code. This technique involves tricking an application into loading a malicious DLL instead of a legitimate one, allowing attackers to execute malicious code while evading detection by […]
The post Hackers Use DLL Side-Loading to Deploy Malicious Python Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2003-0446 | Microsoft Internet Explorer 5.5/6.0 Error Message cross site scripting (EDB-22783 / Nessus ID 11492)
Cloudflare to Implement Post-Quantum Cryptography to Defend Attacks from Quantum Computers
Cloudflare has announced the first phase of end-to-end quantum readiness for its Zero Trust platform, enabling organizations to protect their corporate network traffic against future quantum computer threats. The initiative, which builds on Cloudflare’s research into post-quantum cryptography since 2017, addresses growing concerns about the vulnerability of conventional encryption methods to quantum computing attacks. Quantum […]
The post Cloudflare to Implement Post-Quantum Cryptography to Defend Attacks from Quantum Computers appeared first on Cyber Security News.
Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data
In a sophisticated phishing campaign uncovered by the BI.ZONE Threat Intelligence team, the Squid Werewolf group, also known as APT37, has been impersonating recruiters to target key employees in various organizations. This espionage cluster uses fake job opportunities to lure victims into opening malicious attachments, which ultimately lead to system compromise and data theft. Phishing […]
The post Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
DocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide
The cybersecurity landscape has witnessed a new threat with the emergence of the DocSwap malware, which disguises itself as a “Document Viewing Authentication App” to deceive users into installing it on their Android devices. This sophisticated malware is suspected to be linked to a North Korean-backed Advanced Persistent Threat (APT) group, as revealed by the […]
The post DocSwap Malware Masquerades as Security Document Viewer to Attack Android Users Worldwide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.