Adobe has addressed several critical code execution flaws across a broad spectrum of its products. This move underscores the company’s commitment to software security and protecting its user base against potential cyber threats. Free Webinar on Live API Attack Simulation: Book…
Tag: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
QakBot Malware Exploiting Windows Zero-Day To Gain System Privileges
Hackers exploit the Windows zero-day vulnerabilities, as they offer great advantages. This means that no patches or defenses exist for zero-day vulnerabilities as software vendors are unaware of them, consequently, hackers have a certain period to start their attacks before…
New Google Chrome Zero-day Exploited in the Wild, Patch Now!
Google has issued an urgent security update for its Chrome browser after discovering a zero-day vulnerability that is currently being exploited by attackers. The vulnerability, tracked as CVE-2024-4761, affects the V8 JavaScript engine and could potentially allow attackers to execute arbitrary code on the user’s computer. Google has responded quickly with a patch, urging all users to update their browsers immediately to…
FortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing via Malicious Packets
A critical vulnerability has been discovered in Fortinet’s FortiOS SSL-VPN and FortiProxy SSL-VPN. The flaw, identified as FG-IR-23-225, allows attackers to spoof IP addresses and bypass security controls by sending specially crafted packets. It affects multiple versions of FortiOS and…
Tornado Cash Developer Jailed for Laundering Billions of Dollars
A court has sentenced the developer of the cryptocurrency mixing service Tornado Cash to over five years in prison. The developer was found guilty of designing and operating a platform that laundered billions of dollars, including proceeds from high-profile cybercrimes.…
Beware Of New Social Engineering Attack That Delivers Black Basta Ransomware
Hackers exploit social engineering, which avoids technical security systems, by manipulating the psychology and behavior of a human being. Social engineering techniques, such as baiting emails or pretexting phone calls, manipulate victims into providing confidential information or performing actions that…
Tor Browser 13.0.15 Released: What’s New!
Tor Project has announced the release of Tor Browser 13.0.15. Available now on the Tor Browser download page and through their distribution directory, this new version introduces a series of significant updates and bug fixes that promise to improve the…
Cybersecurity Expert Jailed For Hacking 400K Smart Homes, Selling Videos
Hackers target smart homes due to the increased interconnected devices with often insufficient security measures. Smart homes provide a wealth of personal and sensitive information, including access to security cameras, smart locks, and personal data stored on connected devices. Cybersecurity…
IT Teams Beware! Weaponized WinSCP & PuTTY Delivers Ransomware
Attackers launched a campaign distributing trojanized installers for WinSCP and PuTTY in early March 2024, as clicking malicious ads after searching for the software leads to downloads containing a renamed pythonw.exe that loads a malicious DLL. The DLL side-loads a…
Dell Hack: Attacker Steals Customer Phone Numbers & Service Reports
In a concerning development for Dell Technologies, a threat actor known as Menelik has reportedly accessed and scraped sensitive customer data from a Dell support portal. This latest security breach, which follows a previous incident involving the theft of physical…