GB Hacker
-
Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments
Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated privileges on a system,...
-
Corrupt Police Imprisoned for Revealing Investigation Secrets
Natalie Mottram, a 25-year-old intelligence analyst who worked for Cheshire Police and the North West Regional Organised Crime Unit (ROCU), has...
-
Socks5Systemz Proxy Hacked 10,000+ Systems World Wide
Proxy services let users rent IP addresses and provide online anonymity by disguising their traffic as regular IP addresses while hiding the...
-
Top 5 Kubernetes Vulnerabilities – 2023
Kubernetes is a popular open-source platform for managing containerized workloads and services. It’s a system that simplifies a wide array of...
-
Accenture Acquires Leading Spanish Cybersecurity Firm Innotec Security
Accenture, the global technology services and consulting giant, has announced the acquisition of Innotec Security, a leading...
-
New Common Vulnerability Scoring System (CVSS) v4.0 Released – What’s New!
CVSS (Common Vulnerability Scoring System) is vital for supplier-consumer interaction, offering a numerical score to assess security...
-
Hackers Deliver Malicious DLL Files Chained With Legitimate EXE Files
Hackers opt for DLL hijacking as a technique to exploit vulnerable applications because it allows them to load malicious code by tricking a...
-
CitrixBleed Flaw Widely Exploited, Primarily by a Ransomware Gang
At the end of October, AssetNote released a proof-of-concept for the CVE-2023–4966 associated with sensitive information disclosure for Citrix...
-
F5 Warns of Active Attacks Targeting BIG-IP SQL injection vulnerability
F5 Networks has issued a security alert about a severe vulnerability in its BIG-IP Configuration utility, identified as CVE-2023-46748. This...
-
Atlassian Urged Customers to Fix Critical Confluence Security Flaw Right Away!
Atlassian has been reported with a critical vulnerability in their Confluence Software, which several organizations have widely adopted. The...
-
Hackers Abuse Google Search Ads to Deploy Bonanza Malware
Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking...
-
Hacker Jailed for Stealing $1 Million Via SIM Swapping Attacks
A young man from Orlando, Florida, has been handed a 30-month prison sentence for his role in a cybercrime scheme that stole nearly $1 million in...