GB Hacker
-
Underground Ransomware Continues to Attack Industries Of Various Sizes
Over the past year, the ransomware actor known as “Underground” has been less active than other groups, yet they remain a threat in the...
-
Threat Actors Claiming Breach Of Heineken Employees Data
Threat actors have claimed responsibility for a data breach involving Heineken employees. The news broke through a post on the social media...
-
Progress Telerik Report Server Flaw Let Attackers Bypass Authentication
A new vulnerability related to authentication bypass was discovered in the Progress Telerik Report server. The CVE for this vulnerability has...
-
Hackers Claiming Shell Data Breach On Popular Hacking Forum
In a shocking revelation, a threat actor has allegedly leaked sensitive data belonging to Shell, one of the world’s leading energy companies....
-
Researchers Exploited Nexus Repository Using Directory Traversal Vulnerability
Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes. The widespread use of GitHub and the...
-
GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials
GNOME desktop manager was equipped with a new feature which allowed remote users to create graphical sessions on the system by configuring the...
-
Hackers Exploit WordPress Plugin to Steal Credit Card Data
Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting WooCommerce online stores to steal...
-
Operation SpecTor: Authorities Seized Dark Markets Offering Illicit Goods
Law enforcement agencies have successfully dismantled several dark web marketplaces offering illicit goods. Dubbed “Operation SpecTor,”...
-
Microsoft Replacing VBScript With JavaScript & PowerShell
Microsoft has shifted its scripting options for web development and task automation. The company is replacing VBScript with more advanced...
-
Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code
The widely used team workspace corporate wiki Confluence has been discovered to have a critical remote code execution vulnerability. This...
-
PoC Exploit Released for QNAP QTS zero-day RCE Flaw
Researchers have shown a proof-of-concept (PoC) attack for a zero-day remote code execution (RCE) flaw in the QTS operating system from QNAP....
-
Sonicwall SSL-VPN exploit Advertised on the Dark web
The dark web has seen the release of a new vulnerability that targets SonicWALL SSL-VPN devices. Recently, the exploit, which lets people...