Aggregator
CVE-2024-31609 | BOSSCMS 3.10 Code Configuration cross site scripting
CVE-2024-2310 | WP Google Review Slider Plugin up to 13.5 on WordPress Setting cross site scripting
New Web Skimming Attack Exploits Legacy Stripe API to Validate Stolen Card Data
A sophisticated web-skimming campaign has been discovered, leveraging a deprecated Stripe API to validate stolen credit card data before exfiltration. This novel strategy ensures that only valid and usable card details are exfiltrated, making the operation highly efficient and harder to detect. Detailed insights into the attack have revealed alarming trends and vulnerabilities affecting numerous […]
The post New Web Skimming Attack Exploits Legacy Stripe API to Validate Stolen Card Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials
A newly discovered attack campaign has exposed vulnerabilities in Apache Tomcat servers, allowing hackers to hijack resources and steal SSH credentials. Researchers from Aqua Nautilus revealed that these attacks, which weaponized botnets within 30 hours of discovery, employ encrypted payloads and advanced persistence mechanisms to infiltrate systems running both Windows and Linux platforms. The attackers […]
The post Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Три буквы машинного кода держали в заложниках защищенную виртуализацию Intel
Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware
游戏MOD伴随盗号风险,仿冒网站借“风灵月影”窃密
Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords
Recent cybersecurity findings reveal an alarming increase in malicious activity targeting Juniper’s Session Smart Networking Platform (SSR). According to SANS tech reports, Attackers are focusing their efforts on exploiting devices using the default credentials, “t128” as the username and “128tRoutes” as the password, which are remnants from Juniper’s acquisition of 128 Technologies. The surge in […]
The post Hackers Actively Scanning for Juniper Smart Routers Using Default Passwords appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-0905 | Fancy Product Designer Plugin up to 6.1.7 on WordPress cross site scripting
CVE-2024-2603 | Salon Booking System Plugin up to 9.6.5 on WordPress Setting cross site scripting
CVE-2024-2429 | Salon Booking System Plugin up to 9.6.5 on WordPress Setting cross-site request forgery
CVE-2024-2908 | Call Now Button Plugin up to 1.4.6 on WordPress Setting cross site scripting
CVE-2024-2159 | Social Sharing Plugin up to 3.3.60 on WordPress Shortcode Attribute cross site scripting
CVE-2024-2439 | Salon Booking System Plugin up to 9.6.5 on WordPress Setting cross site scripting
CVE-2024-3059 | ENL Newsletter Plugin up to 1.0.1 on WordPress cross-site request forgery
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on April 3, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-25-093-01 Hitachi Energy RTU500 Series
- ICSA-25-093-02 Hitachi Energy TRMTracker
- ICSA-25-093-03 ABB ACS880 Drives Containing CODESYS RTS
- ICSA-25-093-04 ABB Low Voltage DC Drives and Power Controllers CODESYS RTS
- ICSA-25-093-05 B&R APROL
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
NSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat
Today, CISA—in partnership with the National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), Canadian Centre for Cyber Security (CCCS), and New Zealand’s National Cyber Security Centre (NCSC-NZ)—released joint Cybersecurity Advisory Fast Flux: A National Security Threat (PDF, 841 KB). This advisory warns organizations, internet service providers (ISPs), and cybersecurity service providers of the ongoing threat of fast flux enabled malicious activities and provides guidance on detection and mitigations to safeguard critical infrastructure and national security.
“Fast flux” is a technique used to obfuscate the locations of malicious servers through rapidly changing Domain Name System (DNS) records associated with a single domain name. This threat exploits a gap commonly found in network defenses, making the tracking and blocking of malicious fast flux activities difficult.
The authoring agencies strongly recommend adopting a multi-layered approach to detection and mitigation to reduce risk of compromise by fast flux-enabled threats. Service providers, especially Protective DNS providers (PDNS), should track, share information about, and block fast flux as part of their provided cybersecurity services. Government and critical infrastructure organizations should close this ongoing gap in network defenses by using cybersecurity and PDNS services that block malicious fast flux activity.
For more information on PDNS services, see Selecting a Protective DNS Service.