Aggregator
CVE-2023-45760 | wpDiscuz Plugin up to 7.6.3 on WordPress AJAX Action authorization
CVE-2023-45828 | RumbleTalk Live Group Chat Plugin up to 6.1.9 on WordPress handleRequest authorization
CVE-2023-45104 | BetterLinks Plugin up to 1.6.0 on WordPress Import/Export improper authorization
CVE-2024-13104 | D-Link DIR-816 A2 1.10CNB05_R1B011D88210 WiFi Settings form2AdvanceSetup.cgi access control
CVE-2024-13105 | D-Link DIR-816 A2 1.10CNB05_R1B011D88210 DHCPD Setting /goform/form2Dhcpd.cgi access control
PoC Exploit Released For Critical Windows LDAP RCE Vulnerability
The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers, as a zero-click exploit leverages this by crafting malicious LDAP requests, which, sent without any user interaction, exploit a memory corruption vulnerability within the LDAP service. Upon receiving the malicious request, the vulnerable DC attempts to process it, leading to a […]
The post PoC Exploit Released For Critical Windows LDAP RCE Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Zr.Ms. Luymes vaart uit voor internationale explosievenruiming NAVO
New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings
PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via phishing emails and SEO poisoning of bundled applications, enabling keylogging, screen capture, and other malicious remote access capabilities. A phishing campaign employed a .jpg file as a lure to deliver a malicious RAR archive. Upon extraction and execution, the archive released […]
The post New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA
The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor authentication (2FA). It provides a service that simplifies the process for attackers. and offers an intuitive interface, allowing for the creation of customized phishing templates that mimic legitimate 2FA requests. Tycoon 2FA also integrates automated […]
The post Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys
A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11 (version 24H2) by extracting full volume encryption keys (FVEK) from memory. Using a custom-built tool named Memory-Dump-UEFI, the researcher was able to retrieve sensitive cryptographic keys to decrypt a BitLocker-protected partition. BitLocker, Microsoft’s full-disk encryption system, is designed to protect data by […]
The post Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.