Aggregator
Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor
A sophisticated cyber campaign dubbed “J-magic” has been discovered targeting enterprise-grade Juniper routers with a backdoor attack that leverages a passive monitoring agent. The operation, first detected in September 2023, employs a variant of the cd00r backdoor that continuously scans for specific “magic packets” in TCP traffic. Technical Implementation The malware, masquerading as “JunoscriptService,” operates […]
The post Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Beware of Fake Captcha Verifications Spreading Lumma Malware
In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages to deliver the Lumma Stealer malware. Lumma, a malware-as-a-service (MaaS) tool that has been active since at least 2022, is designed to steal sensitive information from infected systems. The campaign has targeted victims across multiple countries, including Argentina, Colombia, the […]
The post Beware of Fake Captcha Verifications Spreading Lumma Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Social Discovery Group's Kolesnikov Shares How AI, VR, and Web3 Are Changing Dating Culture in 2025
KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed
In a recent technical investigation, researchers uncovered critical insights into the infrastructure linked to a suspected Chinese state-backed cyber actor referred to as “RedGolf.” The group, also known as APT41, BARIUM, or Earth Baku, gained attention following a report by Recorded Future’s Insikt Group in March 2023. Their investigation revealed significant connections to more recent […]
The post KEYPLUG Infrastructure Exposed: Server Configurations and TLS Certificates Revealed appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2003-0579 | IBM U2 Universe up to 10.0.0.9 uvadmsh -uv.install privileges management (EDB-22912)
24年总结
24年总结
24年总结
24年总结
24年总结
24年总结
24年总结
24年总结
PayPal Fined $2 Million Fine For Violating Cybersecurity Regulations
The New York State Department of Financial Services (NYDFS) has imposed a $2 million penalty on PayPal, Inc. for breaches of the state’s stringent cybersecurity regulations. The fine marks a significant move in ensuring accountability for financial institutions handling sensitive customer data. An investigation led by NYDFS revealed that PayPal failed to engage qualified personnel […]
The post PayPal Fined $2 Million Fine For Violating Cybersecurity Regulations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
利用硬件断点绕过EDR检测机制
Bypassing EDR Detection by Exploiting Hardware Breakpoints at CPU Level
Adversaries continue to innovate methods to bypass Endpoint Detection and Response (EDR) systems. An exceptionally sophisticated approach involves leveraging hardware breakpoints at the CPU level to evade detection mechanisms such as Event Tracing for Windows (ETW). According to the Praetorian report, this technique enables attackers to manipulate telemetry in userland without modifying kernel code, presenting […]
The post Bypassing EDR Detection by Exploiting Hardware Breakpoints at CPU Level appeared first on Cyber Security News.