Aggregator
CVE-2023-51605 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1854)
CVE-2023-51604 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1853)
CVE-2023-51602 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1851)
CVE-2023-51601 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1850)
CVE-2023-51600 | Honeywell Saia PG5 Controls Suite xml external entity reference (ZDI-23-1849)
CVE-2023-51610 | Kofax Power PDF JP2 File Parser use after free (ZDI-23-1911)
CVE-2021-34999 | OpenBSD Kernel Multicast Routing uninitialized resource (ZDI-22-073)
CVE-2021-35000 | OpenBSD Kernel Multicast Routing uninitialized resource (ZDI-22-012)
Tor Claims Network is Safe Following Enforcement Infiltration to Expose Criminals
The anonymity of the Tor network has been scrutinized in a recent investigation by German law enforcement agencies. Despite these revelations, the Tor Project maintains that its network remains secure for users. This article delves into the details of the investigation, its implications for Tor, and the response from various stakeholders. Tor stands as the […]
The post Tor Claims Network is Safe Following Enforcement Infiltration to Expose Criminals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actor Allegedly Claims Breach of Federal Bank Customer Data
A threat actor on a well-known dark web forum has allegedly claimed responsibility for a significant data breach involving the Indian financial institution, Federal Bank. The breach reportedly exposes sensitive information of hundreds of thousands of customers, raising serious concerns about data security and privacy. The claim was first reported by a ThreatMon, who shared the […]
The post Threat Actor Allegedly Claims Breach of Federal Bank Customer Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
PoC Exploit Released for CVE-2024-7965 Zero-Day Chrome Vulnerability
A proof-of-concept (PoC) exploit has been released for a critical zero-day vulnerability identified as CVE-2024-7965, affecting Google’s Chrome browser. This vulnerability explicitly targets the V8 JavaScript engine and is exclusive to ARM64 architectures. The release of this PoC has raised concerns within the cybersecurity community, highlighting a potential avenue for exploitation in widely used devices. […]
The post PoC Exploit Released for CVE-2024-7965 Zero-Day Chrome Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Webdav Malicious File Hosting Powering Stealthy Malware Attacks
A new method of attack has emerged that leverages WebDAV technology to host malicious files. This approach, which facilitates the distribution of the Emmenhtal loader—also known as PeakLight—has been under scrutiny since December 2023. The loader is notorious for its stealthy, memory-only execution and its role in distributing various infostealers worldwide. This article delves into […]
The post Webdav Malicious File Hosting Powering Stealthy Malware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Western Agencies Warn Risk from Chinese-Controlled Botnet
CVE-2016-7588 | Apple macOS up to 10.12.1 CoreMedia Playback memory corruption (HT207423 / Nessus ID 95917)
Zenity unveils agent-less security solution for Microsoft 365 Copilot
Zenity announced an agent-less security solution for Microsoft 365 Copilot with the Zenity AI Trust Layer. With this product launch, Zenity is continuing to empower its customers to confidently and securely unleash business enablement. Microsoft 365 Copilot is embedded across the Microsoft suite, including SharePoint and M365. This presents massive opportunities for businesses to enable all their employees and third parties to be more efficient and effective through the use of Generative AI. However, Microsoft 365 … More →
The post Zenity unveils agent-less security solution for Microsoft 365 Copilot appeared first on Help Net Security.