Aggregator
DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords
A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies and local offices of international organizations across various industries. The attackers are spoofing a legitimate Spanish company specializing in mountain and skiing equipment to deliver malicious payloads via email. The emails, which use billing-themed social engineering tactics, feature subjects such as […]
The post DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Submit #545893: codeastro Car Rental System in PHP 1.0 SQL Injection [Accepted]
Submit #545883: Tenda W18E W18E V2.0-V16.01.0.11 Buffer Overflow [Accepted]
Submit #545867: PHPGurukul e-Diary Management System V1.0 SQL Injection [Duplicate]
Submit #545866: ageerle https://github.com/ageerle/ruoyi-ai 20250328 version Unauthorized access vulnerability [Accepted]
SonicWall Firewall Vulnerability Enables Unauthorized Access
Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall firewalls. This critical flaw allows remote attackers to hijack active SSL VPN sessions, enabling unauthorized network access without requiring user credentials. If left unpatched, the vulnerability poses significant risks to organizations relying on SonicWall devices for their network security. CVE-2024-53704: The […]
The post SonicWall Firewall Vulnerability Enables Unauthorized Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Russian Seashell Blizzard Targets Organizations Using Custom-Built Hacking Tools
Seashell Blizzard, also known as APT44, Sandworm, and Voodoo Bear, has emerged as a sophisticated adversary targeting critical sectors worldwide. Associated with Russia’s Military Intelligence Unit 74455 (GRU), this group has been active since at least 2009, focusing on sectors such as energy, telecommunications, government, military, manufacturing, and retail. Their operations often involve long-term access […]
The post Russian Seashell Blizzard Targets Organizations Using Custom-Built Hacking Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
EvilCorp and RansomHub Collaborate to Launch Worldwide Attacks on Organizations
EvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the most active ransomware-as-a-service (RaaS) operations. This partnership has heightened the threat landscape, as both entities leverage advanced tools and techniques to target organizations across the globe. EvilCorp: A History of Cybercrime EvilCorp, led by Maksim Yakubets, has long been notorious […]
The post EvilCorp and RansomHub Collaborate to Launch Worldwide Attacks on Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
AI-Powered Gray Bots Target Web Applications with Over 17,000 Requests Per Hour
Web applications are facing a growing challenge from “gray bots,” a category of automated programs that exploit generative AI to scrape vast amounts of data. Unlike traditional malicious bots, gray bots occupy a middle ground, engaging in activities that, while not overtly harmful, often raise ethical and operational concerns. Recent research highlights the scale of […]
The post AI-Powered Gray Bots Target Web Applications with Over 17,000 Requests Per Hour appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-3199 | Plus Addons for Elementor Plugin up to 5.4.2 on WordPress Countdown Widget cross site scripting
CVE-2024-3890 | Happy Addons for Elementor Plugin up to 3.10.6 on WordPress Calendly Widget cross site scripting (ID 3076871)
CVE-2024-3197 | Plus Addons for Elementor Plugin up to 5.4.2 on WordPress Custom Attributes cross site scripting
CVE-2024-31609 | BOSSCMS 3.10 Code Configuration cross site scripting
CVE-2024-2310 | WP Google Review Slider Plugin up to 13.5 on WordPress Setting cross site scripting
New Web Skimming Attack Exploits Legacy Stripe API to Validate Stolen Card Data
A sophisticated web-skimming campaign has been discovered, leveraging a deprecated Stripe API to validate stolen credit card data before exfiltration. This novel strategy ensures that only valid and usable card details are exfiltrated, making the operation highly efficient and harder to detect. Detailed insights into the attack have revealed alarming trends and vulnerabilities affecting numerous […]
The post New Web Skimming Attack Exploits Legacy Stripe API to Validate Stolen Card Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials
A newly discovered attack campaign has exposed vulnerabilities in Apache Tomcat servers, allowing hackers to hijack resources and steal SSH credentials. Researchers from Aqua Nautilus revealed that these attacks, which weaponized botnets within 30 hours of discovery, employ encrypted payloads and advanced persistence mechanisms to infiltrate systems running both Windows and Linux platforms. The attackers […]
The post Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.