Aggregator
CVE-2013-2150 | ownCloud up to 5.0.6 cross site scripting (Nessus ID 66875 / XFDB-84843)
CVE-2014-2047 | ownCloud 6.0.0/6.0.1 improper authentication (ID 801070)
CVE-2014-2049 | ownCloud up to 4.0.7 access control (ID 801070)
CVE-2013-0299 | ownCloud up to 4.5.6 operation cross-site request forgery (ID 801070)
Russian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure
Russian-aligned cyber threat groups, UAC-0050 and UAC-0006, have significantly escalated their operations in 2025, targeting entities worldwide with a focus on Ukraine. These groups employ bulletproof hosting services to mask their network infrastructure, enabling sophisticated campaigns involving financial theft, espionage, and psychological operations. UAC-0050, linked to Russian law enforcement agencies, has transitioned to deploying NetSupport […]
The post Russian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
BSidesLV24 – Keynotes – Day One: Opening Remarks
Authors/Presenters: Daemon Tamer
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – Keynotes – Day One: Opening Remarks appeared first on Security Boulevard.
Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks
Threat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution
Security researchers have uncovered a new wave of cyberattacks targeting WordPress websites through the exploitation of the “mu-plugins” (Must-Use plugins) directory. This directory, designed to load plugins automatically without requiring activation, has become an attractive hiding spot for threat actors due to its low visibility in standard WordPress interfaces. The malware embedded in this directory […]
The post Threat Actors Embed Malware in WordPress Sites to Enable Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Weaponized Zoom Installer Used by Hackers to Gain RDP Access and Deploy BlackSuit Ransomware
Cybersecurity researchers have uncovered a sophisticated attack campaign where threat actors utilized a trojanized Zoom installer to infiltrate systems, gain remote desktop protocol (RDP) access, and ultimately deploy the BlackSuit ransomware. The operation demonstrates a highly coordinated, multi-stage malware delivery chain designed to evade detection and maximize impact. Multi-Stage Malware Deployment The attack began with […]
The post Weaponized Zoom Installer Used by Hackers to Gain RDP Access and Deploy BlackSuit Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.