Aggregator
Cisco Webex bug lets hackers gain code execution via meeting links
Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader
Akira
Data Is on the Menu ? and AI?s Market Price Is High
KeyPlug Malware Server Leak Exposes Fortinet Firewall and VPN Exploitation Tools
Cybersecurity researchers have stumbled upon a treasure trove of operational tools and scripts linked to the KeyPlug malware, associated with the threat group RedGolf, also known as APT41. The server, which was inadvertently exposed for less than 24 hours, provided an unprecedented glimpse into the sophisticated tactics, techniques, and procedures (TTPs) employed by this advanced […]
The post KeyPlug Malware Server Leak Exposes Fortinet Firewall and VPN Exploitation Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
SpyMax Android Spyware: Full Remote Access to Monitor Any Activity
Threat intelligence experts at Perplexity uncovered an advanced variant of the SpyMax/SpyNote family of Android spyware, cleverly disguised as the official application of the Chinese Prosecutor’s Office (检察院). This malicious software was targeting Chinese-speaking users in mainland China and Hong Kong in what appears to be a sophisticated cyber espionage campaign. Exploiting Android Accessibility Services […]
The post SpyMax Android Spyware: Full Remote Access to Monitor Any Activity appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
PoC Released for Linux Kernel Vulnerability Allowing Privilege Escalation
A security vulnerability, tracked as CVE-2024-53141, has recently come to light in the Linux kernel’s ipset component. This flaw enables out-of-bounds (OOB) write on the kernel heap, which threat actors can exploit to execute arbitrary code with elevated privileges. Security researchers have now released a proof-of-concept (PoC) exploit, escalating concerns about possible real-world attacks on unpatched […]
The post PoC Released for Linux Kernel Vulnerability Allowing Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2023-52223 | MailerLite WooCommerce Integration Plugin up to 2.0.8 on WordPress cross-site request forgery
CVE-2024-27083 | dpgaspar Flask-AppBuilder up to 4.2.0 OAuth Login Page cross site scripting
CVE-2024-24701 | Native Grid A no-code page builder for beautiful performance-based content Plugin cross-site request forgery
CVE-2024-1972 | SourceCodester Online Job Portal 1.0 EditProfile.php Address cross site scripting
CVE-2024-23519 | M&S Consulting Email Before Download Plugin up to 6.9.7 on WordPress cross-site request forgery
CVE-2023-52226 | Advanced Flamingo Plugin up to 1.0 on WordPress cross-site request forgery
CVE-2024-21749 | Atakan Au 1 click disable all Plugin up to 1.0.1 on WordPress cross-site request forgery
CVE-2024-0689 | Custom Field Suite Plugin up to 2.6.4 on WordPress cross site scripting
Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
CVE-2021-20035, an old vulnerability affecting Sonicwall Secure Mobile Access (SMA) 100 series appliances, is being exploited by attackers. Sonicwall confirmed it by updating the original security advisory to reflect the new state of play, and by changing the description of the vulnerability to say that can potentially lead to code execution, instead of only to denial of service (DoS). About CVE-2021-20035) Sonicwall SMA 100 series appliances provide a unified secure access gateway optimized for small … More →
The post Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035) appeared first on Help Net Security.