Aggregator
CVE-2023-4114 | PHP Jabbers Night Club Booking Software 1.0 /index.php index cross site scripting (ID 173932 / EDB-51650)
CVE-2023-4116 | PHP Jabbers Taxi Booking 2.0 /index.php index cross site scripting (ID 173937 / EDB-51652)
CVE-2023-4115 | PHP Jabbers Cleaning Business 1.0 /index.php index cross site scripting (ID 173936 / EDB-51651)
CVE-2019-0227 | Oracle Agile PLM Framework 37689 Web Services server-side request forgery (EDB-46682)
CVE-2009-3444 | e107 CMS up to 0.7.2 email.php cross site scripting (EDB-9825 / BID-36517)
Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks
Verizon Business’s 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints a stark picture of the cybersecurity landscape, drawing from an analysis of over 22,000 security incidents, including 12,195 confirmed data breaches. The report identifies credential abuse (22%) and exploitation of vulnerabilities (20%) as the predominant initial attack vectors, with a 34% […]
The post Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Alleged Sale of Access to Multiple Unidentified Companies in Chile
«И это совсем не больно»: 40% тихоходок остались довольны первыми в мире нано-тату
Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities
A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group, tracked as “Operation SyncHole,” has compromised at least six South Korean organizations across software, IT, financial, semiconductor, and telecommunications sectors since November 2024. According to detailed research, the attackers employed a combination of watering hole attacks and exploited vulnerabilities in widely […]
The post Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Alleged Sale of Unauthorized Admin Access to Unidentified Online Course Platform in Madagascar
Randall Munroe’s XKCD ‘Tennis Balls’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Tennis Balls’ appeared first on Security Boulevard.
ELENOR-corp Ransomware Targets Healthcare Sector
ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools
In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure enterprise fell victim to a meticulously orchestrated attack involving multiple threat actors. The initial access broker, identified as “ToyMaker” with medium confidence as a financially motivated entity, exploited vulnerabilities in internet-facing servers to infiltrate the network. A Sophisticated Multi-Actor Attack on […]
The post ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining
In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured Kubernetes clusters to conduct illicit activities such as cryptomining. The dynamic and complex nature of containerized environments poses significant challenges for security teams in detecting runtime anomalies or identifying the source of breaches. Rising Threats in Containerized Environments According to Microsoft’s […]
The post Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Знаете, что происходит с материей при абсолютном нуле? Спойлер: она отказывается играть по правилам
New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT
A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the creative and insidious methods attackers employ to deliver malware. This operation, dubbed the “Stego-Campaign,” exploits a known Microsoft Office vulnerability, CVE-2017-0199, to initiate infections and ultimately deploy the notorious AsyncRAT malware. Innovative Attack Leverages Hidden Payloads in Images The vulnerability, first […]
The post New Steganography Campaign Exploits MS Office Vulnerability to Distribute AsyncRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
FBI: Cybercrime Losses Rocket to $16.6B in 2024
ARMO: io_uring Interface Creates Security ‘Blind Spot’ in Linux
Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they calle a "massive security loophole" in the operating system's runtime security.
The post ARMO: io_uring Interface Creates Security ‘Blind Spot’ in Linux appeared first on Security Boulevard.
Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell
Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy malicious tools including a web shell and a sophisticated remote access trojan (RAT) named DslogdRAT. According to a detailed analysis by JPCERT/CC, these attacks underscore the persistent and evolving risks surrounding Ivanti products, which have become a frequent target for […]
The post Hackers Exploit Ivanti Connect Secure 0-Day to Deploy DslogdRAT and Web Shell appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.