GB Hacker
-
Over 4,000 Internet-facing Sophos Firewalls Vulnerable to Code Injection Attacks
The Sophos Firewall Webadmin and User Portal HTTP interfaces are vulnerable to unauthenticated and remote code execution, as stated in an alert...
-
GitLab Critical Security Flaw Let Attacker Execute Arbitrary Code
GitLab has released fixes for two security flaws in Git that are of critical severity and might allow attackers to remotely execute arbitrary code...
-
Over 6000 Internet-Exposed Cacti Servers are Unpatched for Critical Security Vulnerability
A significant number of servers that use the Cacti software, and are connected to the internet, have not been updated to fix a security...
-
Hackers Compromised CircleCI Employee’s Laptop to Breach the Company’s Systems
CircleCI, a DevOps platform, discovered that malware installed on a CircleCI engineer’s laptop was used by an unauthorized third party to steal a...
-
Norton Password Manager Breached – Hackers Accessed Username and Password
Customers were notified by NortonLifeLock – Gen Digital that accounts for Norton Password Manager had been successfully breached. They made it...
-
FortiOS SSL-VPN Zero-day Flaw Exploited to Attack Government Organizations
There have been a number of attacks against government organizations and government-related targets using FortiOS SSL-VPN zero-day vulnerabilities...
-
Microsoft Exchange Vulnerabilities Most Exploited by Hackers Targeting Financial Sector
During the month of November, researchers at the cybersecurity firm LookingGlass examined the most significant vulnerabilities in the financial...
-
Hackers Selling Telegram Insider Server Access on Dark Web Forums
SafetyDetectives’ cybersecurity researchers came across a dark web marketplace that claims to provide consumers with access to Telegram’s internal...
-
Microsoft Patch Tuesday – 98 Flaws Patched Including the One Exploited in the Wild
A total of 98 vulnerabilities were fixed on January Patch Tuesday 2023 by Microsoft, including a zero-day vulnerability that was exploited...
-
Default Setup – A New Option to Set Up Code Scanning on GitHub
The GitHub code scanning feature has been enhanced with a new option called “default setup,” designed to assist developers in setting up code...
-
Hackers Use Text-to-SQL Attacks to Break into Your Databases
Recently, a group of researchers successfully demonstrated a new type of attack that utilizes Text-to-SQL models in order to generate malicious...
-
Microsoft Details Techniques Used by Hackers to Deliver Ransomware to macOS Devices
One of the most dominating threats in the current cyberspace era is ransomware which is constantly affecting organizations of all sizes. In order...