Aggregator
CVE-2022-45431 | Dahua DHI-DSS4004-S2 Packet denial of service
CVE-2022-45430 | Dauha DHI-DSS4004-S2 Packet denial of service
CVE-2022-45429 | Dahua DHI-DSS4004-S2 server-side request forgery
CVE-2015-10004 | robbert229 JWT HMAC Comparison timing discrepancy (Issue 12)
CVE-2017-20146 | gorilla handlers cross-domain policy
CVE-2014-125026 | Cloudflare golz4 LZ4 Binding memory corruption
CVE-2018-25046 | Cloud Foundry archiver path traversal
CVE-2013-10005 | btcsuite go-socks RemoteAddr/LocalAddr stack-based overflow
NVIDIA’s Incomplete Patch for Critical Flaw Lets Attackers Steal AI Model Data
A critical vulnerability in NVIDIA’s Container Toolkit, CVE-2024-0132, remains exploitable due to an incomplete patch, endangering AI infrastructure and sensitive data. Coupled with a newly discovered denial-of-service (DoS) flaw in Docker on Linux, these issues could allow attackers to breach systems, steal proprietary AI models, or disrupt operations. Organizations using these tools for AI or […]
The post NVIDIA’s Incomplete Patch for Critical Flaw Lets Attackers Steal AI Model Data appeared first on Cyber Security News.
Threat Actors Manipulate Search Results to Lure Users to Malicious Websites
Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search engine results, pushing malicious websites to the top where unsuspecting users are likely to click. In recent years, this tactic, often known as SEO poisoning or black hat SEO, has seen cybercriminals hijack the reputation of legitimate websites to promote […]
The post Threat Actors Manipulate Search Results to Lure Users to Malicious Websites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Vulnhub:The Planets: Earth Writeup
Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware
Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the Google Play Store to distribute Android malware. These websites, hosted on newly registered domains, create a façade of credible application installation pages, enticing victims with downloads that appear legitimate, including apps like Google Chrome. The sites are engineered with features […]
The post Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
【通知】打击防范电信网络诈骗犯罪培训班5月博鳌开训
【通知】开源情报企业/智库名录(2025)可免费领取
Кварки в запутанности: физики нашли «невидимую нить» между частицами
Гарвардские учёные катнули кривой шар и открыли дверь в старые математические кошмары
Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain
Hackers are exploiting what’s known as “Dangling DNS” records to take over corporate subdomains, posing significant threats to organizations’ security frameworks. This attack vector has been increasingly noted by security teams, highlighting the need for constant vigilance in DNS configuration management. A New Threat Landscape Subdomain takeovers occur when a misconfigured or unused subdomain’s DNS […]
The post Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments
Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware, signaling its resurgence with attacks targeting Windows, Linux, and ESXi environments. HelloKitty ransomware, initially appearing in October 2020 as a fork of DeathRansom, has evolved significantly in its encryption methods. The ransomware now embeds an RSA-2048 public key, which is […]
The post HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge
The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of industries across the globe. In March 2025, this group alone managed to compromise 84 organizations, while new groups like Arkana and CrazyHunter have introduced sophisticated tools and strategies to intensify ransomware attacks. Sophistication in Attack Methods Ransomware groups in March […]
The post RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.