Aggregator
CVE-2023-51610 | Kofax Power PDF JP2 File Parser use after free (ZDI-23-1911)
CVE-2021-34999 | OpenBSD Kernel Multicast Routing uninitialized resource (ZDI-22-073)
CVE-2021-35000 | OpenBSD Kernel Multicast Routing uninitialized resource (ZDI-22-012)
Tor Claims Network is Safe Following Enforcement Infiltration to Expose Criminals
The anonymity of the Tor network has been scrutinized in a recent investigation by German law enforcement agencies. Despite these revelations, the Tor Project maintains that its network remains secure for users. This article delves into the details of the investigation, its implications for Tor, and the response from various stakeholders. Tor stands as the […]
The post Tor Claims Network is Safe Following Enforcement Infiltration to Expose Criminals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actor Allegedly Claims Breach of Federal Bank Customer Data
A threat actor on a well-known dark web forum has allegedly claimed responsibility for a significant data breach involving the Indian financial institution, Federal Bank. The breach reportedly exposes sensitive information of hundreds of thousands of customers, raising serious concerns about data security and privacy. The claim was first reported by a ThreatMon, who shared the […]
The post Threat Actor Allegedly Claims Breach of Federal Bank Customer Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
PoC Exploit Released for CVE-2024-7965 Zero-Day Chrome Vulnerability
A proof-of-concept (PoC) exploit has been released for a critical zero-day vulnerability identified as CVE-2024-7965, affecting Google’s Chrome browser. This vulnerability explicitly targets the V8 JavaScript engine and is exclusive to ARM64 architectures. The release of this PoC has raised concerns within the cybersecurity community, highlighting a potential avenue for exploitation in widely used devices. […]
The post PoC Exploit Released for CVE-2024-7965 Zero-Day Chrome Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Webdav Malicious File Hosting Powering Stealthy Malware Attacks
A new method of attack has emerged that leverages WebDAV technology to host malicious files. This approach, which facilitates the distribution of the Emmenhtal loader—also known as PeakLight—has been under scrutiny since December 2023. The loader is notorious for its stealthy, memory-only execution and its role in distributing various infostealers worldwide. This article delves into […]
The post Webdav Malicious File Hosting Powering Stealthy Malware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Western Agencies Warn Risk from Chinese-Controlled Botnet
CVE-2016-7588 | Apple macOS up to 10.12.1 CoreMedia Playback memory corruption (HT207423 / Nessus ID 95917)
Zenity unveils agent-less security solution for Microsoft 365 Copilot
Zenity announced an agent-less security solution for Microsoft 365 Copilot with the Zenity AI Trust Layer. With this product launch, Zenity is continuing to empower its customers to confidently and securely unleash business enablement. Microsoft 365 Copilot is embedded across the Microsoft suite, including SharePoint and M365. This presents massive opportunities for businesses to enable all their employees and third parties to be more efficient and effective through the use of Generative AI. However, Microsoft 365 … More →
The post Zenity unveils agent-less security solution for Microsoft 365 Copilot appeared first on Help Net Security.
Setting up Lumen for IDA PRO 9
Hacker group Handala Hack Team claim battery explosions linked to Israeli battery company.
New TeamTNT Cryptojacking Campaign Targets CentOS Servers with Rootkit
CVE-2014-6856 | Myvet2pet AHRAH 219426 X.509 Certificate cryptographic issues (VU#582497)
任天堂和宝可梦公司起诉《幻兽帕鲁》开发商
CVE-2018-4386 | Apple iTunes up to 12.9.0 WebKit memory corruption (HT209197 / EDB-47893)
GitLab Patches Critical SAML Authentication Bypass Flaw in CE and EE Editions
Recent WhatsUp Gold Vulnerabilities Possibly Exploited In Ransomware Attacks
Aembit Unveils 2024 Survey Report Highlighting Major Gaps in Securing Non-Human Identities
Aembit, the non-human identity and access management (IAM) company, today released its 2024 Non-Human Identity Security Report, a definitive survey highlighting how organizations currently manage and protect non-human identities (NHIs) – such as applications, scripts, and service accounts. The report reveals a stunning, widespread reliance on outdated methods and manual practices that fail to provide […]
The post Aembit Unveils 2024 Survey Report Highlighting Major Gaps in Securing Non-Human Identities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.