Aggregator
CVE-2024-56575 | Linux Kernel up to 5.15.173/6.1.119/6.6.63/6.12.3 imx-jpeg dev_pm_domain_detach null pointer dereference
CVE-2024-56573 | Linux Kernel up to 6.6.63/6.12.3 free_pool allocation of resources
CVE-2024-56570 | Linux Kernel up to 6.12.3 ovl_dentry_weird stack-based overflow
CVE-2024-56568 | Linux Kernel up to 5.10.230/5.15.173/6.1.119/6.6.65/6.12.3 of_dma_configure null pointer dereference
CVE-2024-56567 | Linux Kernel up to 6.12.3 ad7780_write_raw divide by zero
CVE-2024-56566 | Linux Kernel up to 6.6.63/6.12.3 remove_full allocation of resources
CVE-2024-56563 | Linux Kernel up to 6.12.3 ceph_mds_check_access reference count
CVE-2024-56562 | Linux Kernel up to 6.12.3 i3c_master_put_i3c_addrs use after free
CVE-2024-56561 | Linux Kernel up to 6.12.3 pci_epc_destroy use after free
CVE-2024-56558 | Linux Kernel up to 6.12.3 svc_export_show reference count
CVE-2024-56557 | Linux Kernel up to 6.1.119/6.6.63/6.12.3 ad7923_update_scan_mode buffer overflow
LordVoldemort Claims to have Leaked the Data of Tayfa Shipping
A New Era for Procurement Text Mining
The Impact of Tariffs - SWN Vault
LordVoldemort Claims to have Leaked the Data of Suno India
Hackers exploit DoS flaw to disable Palo Alto Networks firewalls
Lumma Stealer Attacking Users To Steal Login Credentials From Browsers
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised EXE installer, as analysis revealed a parent-child relationship between these samples, all of which communicated with the same C2 server. The Lumma Stealer Trojan, observed in the provided sample, employs advanced techniques to exfiltrate sensitive data from popular browsers and […]
The post Lumma Stealer Attacking Users To Steal Login Credentials From Browsers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack targeting various organizations, unlike typical nation-sponsored attacks. While primarily associated with BeaverTail and InvisibleFerret malware, SOCs have recently observed OtterCookie deployed within this campaign. OtterCookie exhibits distinct behavior from its predecessors, demonstrating the campaign’s evolution and expanding threat landscape, which […]
The post New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in the cybersecurity community. This notorious Remote Access Trojan (RAT), also known as Bladabindi, has long been a tool of choice for cybercriminals due to its extensive capabilities and ease of use. The availability of its latest version on an open-source […]
The post NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.