Aggregator
CVE-2024-6626 | EleForms Plugin up to 2.9.9.9 on WordPress authorization
CVE-2024-9307 | mFolio Lite up to 1.2.1 on WordPress authorization
CVE-2024-10543 | Tumult Hype Animations Plugin up to 1.9.14 on WordPress authorization
CVE-2024-9946 | Social Share, Social Login and Social Comments Plugin improper authentication
CVE-2024-8614 | WP JobSearch Plugin up to 2.6.7 on WordPress unrestricted upload
CVE-2024-8615 | WP JobSearch Plugin up to 2.6.7 on WordPress unrestricted upload
CVE-2024-7879 | WP ULike Plugin up to 4.7.4 on WordPress Setting cross site scripting
CVE-2024-9934 | Wp-ImageZoom Plugin up to 1.1.0 on WordPress cross site scripting
CVE-2024-8323 | Pricing Tables Plugin up to 3.2.6 on WordPress fontFamily cross site scripting
CVE-2024-10715 | MapPress Maps Plugin up to 2.94.1 on WordPress Map Block cross site scripting
CVE-2024-52043 | HumHub up to 1.16.2 on Linux observable response discrepancy
Личное не личное: в сети данные 90% россиян
Researchers Detailed Credential Abuse Cycle
The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a hacking group responsible for distributed denial-of-service attacks. LameDuck, a new threat actor, has carried out several massive distributed denial of service (DDoS) attacks to affect critical infrastructure, cloud providers, and various industries. The group leverages social media to amplify its impact […]
The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools
Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market. Unlike traditional standalone ransomware sales, RaaS offers a subscription-based model where attackers can access pre-built ransomware tools and infrastructure without significant upfront costs. These platforms provide user-friendly dashboards, customization options, and ongoing support, lowering the barrier of entry for cybercriminals, which has made ransomware attacks more accessible […]
The post Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
North Korean Hackers Employing New Tactic To Acruire Remote Jobs
North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their tactics, enhancing the obfuscation of their scripts to evade detection. InvisibleFerret now boasts a dynamic RMM configuration and OS-specific persistence mechanisms, while Contagious Interview has expanded its arsenal with macOS applications, targeting a wider victim pool. These attacks have compromised over […]
The post North Korean Hackers Employing New Tactic To Acruire Remote Jobs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine
Weaponized Linux virtual machines are used for offensive cybersecurity purposes, such as “penetration testing” or “exploiting vulnerabilities.” These setups often use the tools and frameworks that are designed for ethical hacking. Securonix researchers recently detected CRON#TRAP campaign that has been attacking Windows machines with weaponized Linux virtual machines. Technical analysis CRON#TRAP is a sophisticated cyber […]
The post CRON#TRAP Campaign Attacks Windows Machine With Weaponized Linux Virtual Machine appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data
The HookBot malware family employs overlay attacks to trick users into revealing sensitive information by impersonating various brands and apps to gain trust. It also utilizes C2 servers to receive updates and evolve continuously. A builder tool empowers threat actors to create custom HookBot apps as the malware is often distributed through Telegram, where it’s […]
The post HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.