Aggregator
CVE-2023-52634 | Linux Kernel up to 6.7.3 DRM disable_otg_wa denial of service (ce29728ef648/2ce156482a6f / Nessus ID 210815)
CVE-2023-52635 | Linux Kernel up to 5.10.209/5.15.148/6.1.76/6.6.15/6.7.3 Virtual Address cancel_delayed_work_sync buffer overflow (Nessus ID 210815)
CVE-2023-52632 | Linux Kernel up to 6.1.76/6.6.15/6.7.3 amdkfd __synchronize_srcu denial of service (Nessus ID 210815)
Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks
In recent months, a sophisticated social engineering technique known as ClickFix has gained significant traction among cybercriminals and nation-state-sponsored groups. This method exploits human psychology by presenting users with fake prompts that appear to resolve a non-existent issue, effectively bypassing traditional security measures. The ClickFix technique involves deceiving users into executing malicious PowerShell commands by […]
The post Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Supply Chain Attack Targets 23,000 GitHub Repositories
A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which is used in over 23,000 repositories. The attack involves a malicious modification of the Action’s code, leading to the exposure of CI/CD secrets in GitHub Actions build logs. This vulnerability was detected by StepSecurity’s Harden-Runner, a tool designed to secure CI/CD […]
The post Supply Chain Attack Targets 23,000 GitHub Repositories appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
RansomHub
RansomHub
Когда пламя слушается кода: код GENE предсказывает каждый всплеск плазмы
Beware! Malware Hidden in Free Word-to-PDF Converters
The FBI has issued a warning about a growing threat involving free file conversion tools, which are being used to spread malware. This scam, described as “rampant” by the FBI’s Denver Field Office, targets users who seek online tools to convert files between different formats, such as converting Word documents to PDFs or videos to […]
The post Beware! Malware Hidden in Free Word-to-PDF Converters appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-41602 | Spina CMS up to 2.18.0 URL cross-site request forgery
CVE-2024-41603 | Spina CMS 2.18.0 /admin/layout cross-site request forgery
CVE-2024-2337 | Easy Testimonials Plugin up to 3.9.5 on WordPress Shortcode cross site scripting
CVE-2024-5804 | Conditional Fields for Contact Form 7 Plugin up to 2.4.13 on WordPress Setting cross-site request forgery
CVE-2024-41597 | ProcessWire 3.0.229 Comments cross-site request forgery
Безграничный астрент: суд остановил рост долга «Гугла» на астрономической отметке
MassJacker Clipper Malware Targets Users Installing Pirated Software
A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets users who download pirated software from sites like pesktop.com. This malware operates by replacing cryptocurrency wallet addresses copied by users with those belonging to the attackers, aiming to redirect funds to the threat actors’ wallets. The discovery highlights the risks associated […]
The post MassJacker Clipper Malware Targets Users Installing Pirated Software appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Dell security advisory (AV25-147)
SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware
SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the distribution of RansomHub ransomware. This malicious framework exploits compromised websites by injecting them with obfuscated JavaScript loaders, which redirect users to fake browser update notifications. These notifications trick users into downloading and executing malicious files, thereby initiating the infection process. […]
The post SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers
A recent cybersecurity threat has emerged in the form of a steganographic campaign that uses seemingly harmless JPG files to distribute multiple types of malware, including password stealers like Remcos and AsyncRAT. This sophisticated attack begins with a phishing email containing a malicious Excel document that exploits a known vulnerability, CVE-2017-0199, to initiate the infection […]
The post New Steganographic Malware Hides in JPG Files to Deploy Multiple Password Stealers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.