Aggregator
Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware
The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its focus to corporate Human Resources (HR) departments with a highly targeted spear-phishing operation. According to research by Arctic Wolf Labs, the group is leveraging legitimate job platforms and messaging services to send fraudulent job applications laced with malicious resumes. These deceptive […]
The post Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
UK shares security tips after major retail cyberattacks
Submit #564591: https://github.com/megagao/production_ssm production_ssm <= 0.0.1 Remote Code Execute [Accepted]
Submit #564339: PHPGurukul Company Visitors Management System V2.0 SQL Injection [Accepted]
RomCom RAT Targets UK Organizations Through Compromised Customer Feedback Portals
The Russian-based threat group RomCom, also known as Storm-0978, Tropical Scorpius, and Void Rabisu, has been targeting UK companies in the retail, hospitality, and critical national infrastructure (CNI) sectors in a recently discovered cyber espionage and profit-driven operation called “Operation Deceptive Prospect.” Active since at least 2022, RomCom has a history of blending espionage with […]
The post RomCom RAT Targets UK Organizations Through Compromised Customer Feedback Portals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #564329: SourceCodester Online-Student-Clearance-System 1.0 SQL Injection [Accepted]
Submit #571379: magento 1.9.2.1 Improper Input Validation [Accepted]
Hackers Use Pahalgam Attack-Themed Decoys to Target Indian Government Officials
The Seqrite Labs APT team has uncovered a sophisticated cyber campaign by the Pakistan-linked Transparent Tribe (APT36) targeting Indian Government and Defense personnel. This operation, centered around the recent Pahalgam terror attack on April 22, 2025, leverages emotionally charged themes to distribute phishing documents and deploy malicious payloads. Exploiting Geopolitical Tensions for Cyber Espionage The […]
The post Hackers Use Pahalgam Attack-Themed Decoys to Target Indian Government Officials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #564318: 74cms 74cms se 3.33 RCE [Accepted]
BSidesLV24 – Proving Ground – An Adversarial Approach To Airline Revenue Management
Author/Presenter: Craig Lester
Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel.
The post BSidesLV24 – Proving Ground – An Adversarial Approach To Airline Revenue Management appeared first on Security Boulevard.
Submit #564161: fp2952 spring-cloud-base master branch Open Redirect [Accepted]
LUMMAC.V2 Stealer Uses ClickFix Technique to Deceive Users into Executing Malicious Commands
The LUMMAC.V2 infostealer malware, also known as Lumma or Lummastealer, has emerged as a significant threat, employing the cunning “ClickFix” social engineering technique to compromise unsuspecting users. This malware, rewritten from C to C++ with an advanced binary morpher, targets a broad spectrum of sensitive data, including credentials, emails, personal details, screenshots, and cookies from […]
The post LUMMAC.V2 Stealer Uses ClickFix Technique to Deceive Users into Executing Malicious Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #563555: http://www.mrcms.cn/ mrcms 3.1.2 Cross-Site Request Forgery [Accepted]
Submit #563549: http://www.mrcms.cn/ mrcms 3.1.2 Stored Cross-Site Scripting [Accepted]
Submit #563545: http://www.mrcms.cn/ mrcms 3.1.2 Stored Cross-Site Scripting [Accepted]
Submit #563543: http://www.mrcms.cn/ mrcms 3.1.2 Stored Cross-Site Scripting [Accepted]
Submit #563540: http://www.mrcms.cn/ mrcms 3.1.2 Stored Cross-Site Scripting [Accepted]
Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000
A newly discovered dark web listing claims to sell a critical SS7 protocol exploit for $5,000, raising alarms about global telecom security. The seller, operating under the alias “GatewayPhantom,” is marketing the 0-day vulnerability as a tool for SMS interception, real-time phone tracking, and location monitoring. Signaling System No. 7 (SS7) is a 1975 telecommunications […]
The post Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.