cyber security Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/cyber-security/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Tue, 12 Nov 2024 03:46:26 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png cyber security Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/tag/cyber-security/ 32 32 10 Best DNS Management Tools – 2025 https://gbhackers.com/dns-management-tools/ https://gbhackers.com/dns-management-tools/#respond Tue, 12 Nov 2024 03:46:25 +0000 https://gbhackers.com/?p=74568 Best DNS Management Tools play a crucial role in efficiently managing domain names and their associated DNS records. These tools enable users to make necessary changes and updates to DNS records, ensuring seamless website performance and accessibility. These tools are crucial to the smooth operation of the Internet, including web traffic, email delivery, and web […]

The post 10 Best DNS Management Tools – 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/dns-management-tools/feed/ 0
Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays https://gbhackers.com/tor-network-suffers-ip-spoofing-attack-via-non-exit-relays/ https://gbhackers.com/tor-network-suffers-ip-spoofing-attack-via-non-exit-relays/#respond Mon, 11 Nov 2024 10:35:35 +0000 https://gbhackers.com/?p=114734 In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse complaints and temporary disruptions. While the attack affected non-exit relays and caused some relays to be taken offline, the overall impact on Tor users was limited. Tor directory authorities, relay operators, and the Tor Project sysadmin team began receiving numerous […]

The post Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/tor-network-suffers-ip-spoofing-attack-via-non-exit-relays/feed/ 0
Metasploit Framework Released with New Features https://gbhackers.com/metasploit-framework-released/ https://gbhackers.com/metasploit-framework-released/#respond Mon, 11 Nov 2024 08:08:32 +0000 https://gbhackers.com/?p=114714 The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced an exciting new release packed with cutting-edge features. The latest update includes new payloads targeting the emerging RISC-V architecture, a sophisticated SMB-to-HTTP(S) relay exploit for Active Directory Certificate Services (AD CS), and several new modules addressing high-profile vulnerabilities. These additions […]

The post Metasploit Framework Released with New Features appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/metasploit-framework-released/feed/ 0
Threat Actors Allegedly Claim Leak of 489 Million Lines of Instagram Data https://gbhackers.com/leak-of-instagram-data/ https://gbhackers.com/leak-of-instagram-data/#respond Mon, 11 Nov 2024 07:11:11 +0000 https://gbhackers.com/?p=114705 A threat actor has allegedly scraped 489 million lines of Instagram user data, including sensitive information, which is now reportedly being sold on the dark web. DarkWebInformer’s official X account revealed the alarming incident, raising concerns over the scale and potential impact of the breach. The compromised data includes many user details, such as usernames, […]

The post Threat Actors Allegedly Claim Leak of 489 Million Lines of Instagram Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/leak-of-instagram-data/feed/ 0
Threat Actors Allegedly Claim Leak of Harley-Davidson Database https://gbhackers.com/leak-of-harley-davidson-database/ https://gbhackers.com/leak-of-harley-davidson-database/#respond Mon, 11 Nov 2024 06:23:17 +0000 https://gbhackers.com/?p=114701 Threat actors known as “888” have allegedly leaked the database of Appleton Harley-Davidson, a prominent dealership affiliated with the iconic motorcycle brand. The breach, first reported by DarkWebInformer on their account on X, has sparked concerns over the safety of customer data and the broader implications for cybersecurity in the retail automotive sector. Leak of […]

The post Threat Actors Allegedly Claim Leak of Harley-Davidson Database appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/leak-of-harley-davidson-database/feed/ 0
CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks https://gbhackers.com/cisa-warns-of-critical-palo-alto-networks-vulnerability-exploited-in-attacks/ https://gbhackers.com/cisa-warns-of-critical-palo-alto-networks-vulnerability-exploited-in-attacks/#respond Fri, 08 Nov 2024 06:15:17 +0000 https://gbhackers.com/?p=114630 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns organizations of a critical vulnerability in Palo Alto Networks’ Expedition tool, which could lead to severe security breaches. The vulnerability, CVE-2024-5910, is classified as a “Missing Authentication” flaw that potentially allows attackers with network access to take control of an Expedition admin account. According to CISA’s […]

The post CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cisa-warns-of-critical-palo-alto-networks-vulnerability-exploited-in-attacks/feed/ 0
Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information https://gbhackers.com/cisco-desk-phone-series-vulnerability/ https://gbhackers.com/cisco-desk-phone-series-vulnerability/#respond Thu, 07 Nov 2024 12:28:08 +0000 https://gbhackers.com/?p=114625 A significant vulnerability (CVE-2024-20445) has been discovered in Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 that could allow remote, unauthenticated attackers to access sensitive information. This vulnerability, classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), is due to improper storage of sensitive information within the web […]

The post Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cisco-desk-phone-series-vulnerability/feed/ 0
Cisco Flaw Let Attackers Run Command as Root User https://gbhackers.com/cisco-flaw-attackers-run-command-root-user/ https://gbhackers.com/cisco-flaw-attackers-run-command-root-user/#respond Thu, 07 Nov 2024 06:03:54 +0000 https://gbhackers.com/?p=114613 A critical vulnerability has been discovered in Cisco Unified Industrial Wireless Software, which affects Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points. This flaw tracked as CVE-2024-20418 enables unauthenticated, remote attackers to perform command injection attacks and execute arbitrary commands as the root user on the underlying operating system of the affected devices. Vulnerability Details – […]

The post Cisco Flaw Let Attackers Run Command as Root User appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cisco-flaw-attackers-run-command-root-user/feed/ 0
Researchers Detailed Credential Abuse Cycle https://gbhackers.com/credential-abuse-cycle-research/ https://gbhackers.com/credential-abuse-cycle-research/#respond Wed, 06 Nov 2024 12:33:49 +0000 https://gbhackers.com/?p=114584 The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a hacking group responsible for distributed denial-of-service attacks.  LameDuck, a new threat actor, has carried out several massive distributed denial of service (DDoS) attacks to affect critical infrastructure, cloud providers, and various industries.  The group leverages social media to amplify its impact […]

The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/credential-abuse-cycle-research/feed/ 0
Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools https://gbhackers.com/ransomware-as-a-service-decline-custom-tools/ https://gbhackers.com/ransomware-as-a-service-decline-custom-tools/#respond Wed, 06 Nov 2024 12:30:21 +0000 https://gbhackers.com/?p=114576 Ransomware-as-a-Service (RaaS) platforms have revolutionized the ransomware market. Unlike traditional standalone ransomware sales, RaaS offers a subscription-based model where attackers can access pre-built ransomware tools and infrastructure without significant upfront costs.  These platforms provide user-friendly dashboards, customization options, and ongoing support, lowering the barrier of entry for cybercriminals, which has made ransomware attacks more accessible […]

The post Rise Of Ransomware-As-A-Service Leads To Decline Of Custom Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/ransomware-as-a-service-decline-custom-tools/feed/ 0