Aggregator
Submit #408299: 123Solar 1.8.4.5 Cross Site Scripting [Accepted]
Submit #408298: jeanmarc77 123Solar 1.8.4.5 Code Injection [Accepted]
CVE-2024-45861 | Kastle Systems Access Control System hard-coded credentials (icsa-24-263-05)
CVE-2024-6404 | MegaSys Computer Technologies Telenium Online Web Application up to 8.3 HTTP code injection (icsa-24-263-04)
Police dismantles phone unlocking ring linked to 483,000 victims
CVE-2024-41721 | FreeBSD bhyve out-of-bounds
中国和全世界的排放可能提前达到峰值
CVE-2024-7737 | Dassault Systèmes 3DSwymer up to R2024x cross site scripting
U.S. CISA adds Microsoft Windows, Apache HugeGraph-Server, Oracle JDeveloper, Oracle WebLogic Server, and Microsoft SQL Server bugs to its Known Exploited Vulnerabilities catalog
CVE-2024-7736 | Dassault Systèmes ENOVIA Collaborative Industry Innovator up to R2024x cross site scripting
CVE-2024-45752 | logiops up to 0.3.4 logid Daemon access control
Researchers Detailed Raptor Train Botnet That 60,000+ Compromised Devices
Researchers discovered a large, Chinese state-sponsored IoT botnet, “Raptor Train,” that compromised over 200,000 SOHO and IoT devices. Operated by Flax Typhoon, the botnet leveraged a sophisticated control system, “Sparrow,” to manage its extensive network. The botnet posed a significant threat to various sectors, including military, government, and IT, with the potential for DDoS attacks […]
The post Researchers Detailed Raptor Train Botnet That 60,000+ Compromised Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Using Supershell Malware To Attack Linux SSH Servers
Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack leverages Supershell, a cross-platform reverse shell backdoor written in Go, granting attackers remote control of compromised systems. Following the initial infection, attackers are suspected to have deployed scanners to identify additional vulnerable targets and then likely launched dictionary attacks on these […]
The post Hackers Using Supershell Malware To Attack Linux SSH Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Exploit Default Credentials in FOUNDATION Software to Breach Construction Firms
Threat Actors Forcing victims Into Entering Login Credentials For Stealing
Recent intelligence indicates a new technique employed by stealers to trick victims into entering credentials directly into a browser, enabling subsequent theft from the browser’s credential store. This method, used in conjunction with StealC malware, was first observed in August 2024 and is primarily deployed by Amadey. The technique involves forcing victims to interact with […]
The post Threat Actors Forcing victims Into Entering Login Credentials For Stealing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2007-3168 | EDraw Office Viewer Component prior 5.0 ActiveX Control edrawofficeviewer.ocx memory corruption (EDB-4010 / Nessus ID 26012)
SambaSpy Using Weaponized PDF Files to Attack Windows Users
SambaSpy Attacking Windows Users With Weaponized PDF FilesResearchers discovered a targeted cybercrime campaign in May 2024 that exclusively focused on Italian victims, which was unusual as attackers typically aim for broader targets to increase profits. However, this campaign implemented checks at different stages of the infection chain to ensure only Italian users were affected, which […]
The post SambaSpy Using Weaponized PDF Files to Attack Windows Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.