Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent vulnerabilities. Prior studies often oversimplify the problem into binary classification tasks, which poses challenges for deep learning models to effectively learn diverse vulnerability characteristics. To address…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control
Security researchers at Cado Security Labs have uncovered a new variant of the Cerber ransomware targeting Linux systems. This strain of the notorious malware has been observed exploiting a recent vulnerability in the Atlassian Confluence application to gain a foothold…
North Korean Hackers Abuse DMARC To Legitimize Their Emails
DMARC is targeted by hackers as this serves to act as a preventative measure against email spoofing and phishing attempts. They compromise DMARC (Domain-based Message Authentication Reporting and Conformance) so that they can evade email authentication protocols, consequently enabling them…
L00KUPRU Ransomware Attackers discovered in the wild
A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the wild, posing a threat to unsuspecting users. The L00KUPRU ransomware is known to encrypt user files, appending the .L00KUPRU extension to the affected files. The attackers…
Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!
Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities across multiple Oracle products. This comprehensive update fixes critical flaws that could allow remote code execution, data manipulation, and unauthorized access to systems. Affected Products and…
Cisco Warns Of Massive Brute-Force Attacks Targeting VPNs & SSH Services
Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or get into systems without permission. By systematically trying various combinations of usernames and passwords, attackers can exploit weak credentials. Brute-force attacks are automated and scalable, enabling…
Outlook Login Panel Themed Phishing Attack Evaded All Antivirus Detections
Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections. The attack, designed to mimic the Outlook login panel, successfully tricking users into revealing their login credentials. Security researcher @doc_guard first reported the attack on Twitter,…
Operation MidnightEclipse: Hackers Actively Exploiting Palo Alto Networks Zero-Day Flaw
The Palo Alto Networks PAN-OS software has a critical command injection vulnerability that allows an unauthorized attacker to run arbitrary code on the firewall with root access. The vulnerability is identified as CVE-2024-3400, with a CVSS score of 10.0. Operation MidnightEclipse…
Tor Browser 13.0.14 Released – What’s New!
The Tor Project has released a new version of the Tor Browser, their secure and private web browsing tool. Tor Browser 13.0.14 includes several critical security updates and bug fixes. Key Updates in Tor Browser 13.0.14 The latest release of…
Iran Launched A Major Cyberattack Against Critical Infrastructure In Israel
Over the weekend, Iran launched missile and drone attacks on Israel, retaliating for a suspected Israeli strike on its Damascus consulate that killed 13 people last week. This escalation arises from the ongoing Israel-Iran rivalry and Israel-Palestine conflict. Cyber activities…