Aggregator
Unexplained ‘Noise Storms’ flood the Internet, puzzle experts
Windows users targeted with fake human verification pages delivering malware
For a while now, security researchers have been warning about fake human verification pages tricking Windows users into inadvertently installing malware. A recently exposed campaign showed how some users end up on these pages. Beware of fake human verification pages In late August 2024, Palo Alto Networks’ Unit 42 spotted seven CAPTCHA-style human verification pages that were not what they seemed. “These pages have a button that, when clicked, shows instructions for victims to paste … More →
The post Windows users targeted with fake human verification pages delivering malware appeared first on Help Net Security.
Trending cyberthreats and techniques from the first half of 2024
CVE-2023-35748 | D-Link DAP-2622 DDP Service stack-based overflow (ZDI-23-1254)
CVE-2023-51603 | Honeywell Saia PG5 Controls Suite CAB File Parser path traversal (ZDI-23-1852)
CVE-2023-51599 | Honeywell Saia PG5 Controls Suite path traversal (ZDI-23-1848)
CVE-2023-51605 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1854)
CVE-2023-51604 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1853)
CVE-2023-51602 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1851)
CVE-2023-51601 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1850)
CVE-2023-51600 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1849)
CVE-2023-51610 | Kofax Power PDF JP2 File Parser use after free (ZDI-23-1911)
CVE-2021-34999 | OpenBSD Kernel Multicast Routing uninitialized resource (ZDI-22-073)
CVE-2021-35000 | OpenBSD Kernel Multicast Routing uninitialized resource (ZDI-22-012)
Tor Claims Network is Safe Following Enforcement Infiltration to Expose Criminals
The anonymity of the Tor network has been scrutinized in a recent investigation by German law enforcement agencies. Despite these revelations, the Tor Project maintains that its network remains secure for users. This article delves into the details of the investigation, its implications for Tor, and the response from various stakeholders. Tor stands as the […]
The post Tor Claims Network is Safe Following Enforcement Infiltration to Expose Criminals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actor Allegedly Claims Breach of Federal Bank Customer Data
A threat actor on a well-known dark web forum has allegedly claimed responsibility for a significant data breach involving the Indian financial institution, Federal Bank. The breach reportedly exposes sensitive information of hundreds of thousands of customers, raising serious concerns about data security and privacy. The claim was first reported by a ThreatMon, who shared the […]
The post Threat Actor Allegedly Claims Breach of Federal Bank Customer Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
PoC Exploit Released for CVE-2024-7965 Zero-Day Chrome Vulnerability
A proof-of-concept (PoC) exploit has been released for a critical zero-day vulnerability identified as CVE-2024-7965, affecting Google’s Chrome browser. This vulnerability explicitly targets the V8 JavaScript engine and is exclusive to ARM64 architectures. The release of this PoC has raised concerns within the cybersecurity community, highlighting a potential avenue for exploitation in widely used devices. […]
The post PoC Exploit Released for CVE-2024-7965 Zero-Day Chrome Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Webdav Malicious File Hosting Powering Stealthy Malware Attacks
A new method of attack has emerged that leverages WebDAV technology to host malicious files. This approach, which facilitates the distribution of the Emmenhtal loader—also known as PeakLight—has been under scrutiny since December 2023. The loader is notorious for its stealthy, memory-only execution and its role in distributing various infostealers worldwide. This article delves into […]
The post Webdav Malicious File Hosting Powering Stealthy Malware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.