From gbhackers.com
Bug Bounty Bonanza: $40,000 Reward for Escalating Limited Path Traversal to RCE
1 1
Turning a limited path traversal vulnerability into a fully-fledged remote code execution (RCE) exploit, earning a generous bounty of $40,000.
#bugbounty #cybersecurity #CyberSecurityNews
16h ago
From gbhackers.com
BitMEX Fined $100 Million for Violating Bank Secrecy Act
1 1
In a significant legal development, HDR Global Trading Ltd., operating under the name BitMEX, has been fined $100 million for violating the Bank Secrecy Act.
#cybersecurity #CyberSecurityNews
18h ago
From gbhackers.com
Hackers Deploy Web Shell To Abuse IIS Worker And Exfiltrate Data
1 1
An attacker exploited a vulnerability in the batchupload.aspx and email_settings.aspx pages on the target server that allowed them to upload
#cve #iis #cyberattack #webshellattack #iisexploitation #CyberSecurityNews #cybersecurityincident
19h ago
Pumakit - A Sophisticated Linux Rootkit Attack Critical Infrastructure
1 1
a stealthy and highly sophisticated Linux rootkit named Pumakit has been identified, targeting critical infrastructure sectors.
#malware #cybersecurity #CyberSecurityNews
22h ago
From gbhackers.com
FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages
1 1
Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing campaigns are delivered
#phishing #microsoft #cybercrime #cybersecurity #credentialtheft #phishingattacks #CyberSecurityNews
12h ago
US Treasury Breach - Chinese Hackers Accessed Secretary Janet Yellen’s Computer
1 1
Chinese state-sponsored hackers have successfully breached the computer systems of the U.S. Treasury Department, gaining access to Secretary Janet Yellen's personal computer.
#cybernews #cyberattack #cybersecurity #CyberSecurityNews #computersecuritynews
23h ago
From gbhackers.com
AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
2 2
AWS has issued a critical security advisory highlighting vulnerabilities in specific versions of its native clients for Amazon WorkSpaces, AppStream 2.0.
#aws #cve #infosec #ceptbiro #security #amazonaws #amazondcv #vulnerability #amazonappstream #vulnerabilities
11h ago
From gbhackers.com
Russian Threat Actor "Star Blizzard" Exploit WhatsApp Accounts Using QR Codes
1 1
Microsoft Threat Intelligence has identified a concerning strategic shift by the notorious Russian threat actor group "Star Blizzard."
20h ago
From gbhackers.com
Let’s Encrypt Unveils Six-Day Certificate and IP Address Options for 2025
2 2
Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP address certificates in 2025.
#infosec #ceptbiro #security #letsencrypt #ipaddressoptions #CyberSecurityNews #sixdaycertificate #cybersecurity
16h ago
Russian Hackers Attacking WhatsApp Users With Malicious QR Codes
1 1
Russian state-sponsored hacking group Star Blizzard has shifted its tactics to exploit WhatsApp users through malicious QR codes.
#malware #cyberattack #cybersecurity #cyberthreatnews #CyberSecurityNews
22h ago
From gbhackers.com
New Tool Unveiled to Scan Hacking Content on Telegram
1 1
A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI module designed to monitor and analyze content on Telegram.
#tools #telegram #cybersecurity #CyberSecurityNews
12h ago
From ciso2ciso.com
Sophos ZTNA Updates – Source: news.sophos.com
1 1
Source: news.sophos.com - Author: Chris McCormack PRODUCTS & SERVICES
#ztna #network #products #nakedsecurity #CyberSecurityNews #rssfeedpostgeneratorecho
19h ago
From gbhackers.com
PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability
2 2
A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables remote unauthenticated attackers to execute arbitrary code.
#cve #rce #ivanti #infosec #ceptbiro #security #pocexploit #connectsecure #CyberSecurityNews #cybersecurity
16h ago
From ciso2ciso.com
Gootloader inside out – Source: news.sophos.com
1 1
Source: news.sophos.com - Author: Gabor Szappanos The Gootloader malware family uses a distinctive form of social engineering to infect computers: Its cre
#php #seo #yara #gootkit #jscript #malware #Featured #phpshell #wordpress #gootloader
20h ago
From ciso2ciso.com
Was ist ein Payload? – Source: www.csoonline.com
1 1
Source: www.csoonline.com - Author: Kein Cyberangriff ohne Payload. Doch was genau meint der Begriff, welche Arten gibt es und wie las
#csoonline #riskmanagement #CyberSecurityNews #rssfeedpostgeneratorecho
13h ago
AWS Patches Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV
1 1
AWS has recently addressed two critical security vulnerabilities affecting its popular cloud-based services.
#threats #cyberattack #cyberattacknews #CyberSecurityNews
9h ago
Active Directory Group Policy Bypassed To Allow NTLMv1 Authentications
1 1
Silverfort's cybersecurity research team has uncovered a significant flaw in Microsoft's Active Directory Group Policy that allows NTLMv1 authentication to persist despite being ostensibly disabled.
#ntlmv1 #cybersecurity #authentication #CyberSecurityNews #networksecuritynews #computersecuritynews
19h ago
CISA Releases Recommendations For Closing Software Understanding Gap
1 1
CISA in collaboration with other federal agencies, has released a report urging a national effort to close the software understanding gap.
#threats #cybersecurity #CyberSecurityNews
19h ago
From gbhackers.com
CISA Releases Guidelines For Closing Software Understanding Gap
1 1
The Cybersecurity and Infrastructure Security Agency (CISA) has released a pivotal report calling for urgent action to address the “software understanding gap.”
#software #cybersecurity #CyberSecurityNews
19h ago