GB Hacker
-
D-LINK SQL Injection Vulnerability Let Attacker Gain Admin Privileges
A security flaw called SQL injection has been uncovered in the D-Link DAR-7000 device. SQL injection is a malicious attack that exploits...
-
VMware Tools Flaw Let Attackers Escalate Privileges
Two high vulnerabilities have been discovered in VMware Tools, which were assigned with CVE-2023-34057 and CVE-2023-34058 . These...
-
Hackers Using Secure USB Drives to Attack Government Entities
An ongoing attack on government agencies in the APAC region has been claimed to have compromised a secure USB device with hardware encryption....
-
Multiple SonicWall Vulnerabilities Resulted in a Firewall Crash
Multiple vulnerabilities were detected in the SonicOS Management web interface and the SSLVPN portal, resulting in a firewall crash. In a...
-
Synology NAS System Flaw Let Attackers Remotely Hijack the Admin Account
Synology DiskStation Manager (DSM) powers Synology NAS systems, offering remote file access and management. The DSM OS includes two default...
-
Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component
TeamViewer’s popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain....
-
XorDDoS Infects Linux Devices and uses them to Carry out DDoS Attacks
A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies that can be...
-
Researchers Uncovered the Hack of a Private Power Station in Israel
In the continuing Israel-Palestine conflict, there has been a noticeable rise in hacktivist groups who are planning an unending attack against a...
-
AgentTesla Stealer Delivered Via Weaponized PDF and CHM Files
AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the...
-
Microsoft to Kill NTLM and Expand Kerberos Authentication
In an ever-changing digital landscape, robust security measures are paramount. As Windows adapts to meet the evolving demands of our world, user...
-
Hackers Using Remote Admin Tools To Compromise Organizations With Ransomware
Cybercriminals behind the AvosLocker ransomware attack employed a tactic of infecting organizations through Open-Source Remote Administration...
-
Container Security in a GitOps Environment
GitOps is a methodology that uses Git (or other version control systems) to store all aspects of a project’s infrastructure, such as...