Cyber Security News Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/cyber-security-news/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Mon, 11 Nov 2024 11:11:47 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Cyber Security News Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/cyber-security-news/ 32 32 Researchers Detailed Credential Abuse Cycle https://gbhackers.com/credential-abuse-cycle-research-2/ https://gbhackers.com/credential-abuse-cycle-research-2/#respond Mon, 11 Nov 2024 11:11:46 +0000 https://gbhackers.com/?p=114618 Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them to gain unauthorized access. This can lead to data breaches, identity theft, and financial loss across diverse industries and geographic locations. Compromised credentials pose a significant security risk primarily due to data breaches and user negligence. In Q3 2024, they […]

The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/credential-abuse-cycle-research-2/feed/ 0
New Android Malware SpyAgent Taking Screenshots Of User’s Devices https://gbhackers.com/android-malware-spyagent-screenshots/ https://gbhackers.com/android-malware-spyagent-screenshots/#respond Mon, 11 Nov 2024 11:02:45 +0000 https://gbhackers.com/?p=114708 SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from screenshots stored on infected devices.  By stealthily capturing screenshots, the malware bypasses traditional security measures that rely on text-based detection, which allows it to efficiently identify and exfiltrate sensitive information, posing a significant threat to cryptocurrency users. Cybercriminals are employing […]

The post New Android Malware SpyAgent Taking Screenshots Of User’s Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/android-malware-spyagent-screenshots/feed/ 0
Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays https://gbhackers.com/tor-network-suffers-ip-spoofing-attack-via-non-exit-relays/ https://gbhackers.com/tor-network-suffers-ip-spoofing-attack-via-non-exit-relays/#respond Mon, 11 Nov 2024 10:35:35 +0000 https://gbhackers.com/?p=114734 In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse complaints and temporary disruptions. While the attack affected non-exit relays and caused some relays to be taken offline, the overall impact on Tor users was limited. Tor directory authorities, relay operators, and the Tor Project sysadmin team began receiving numerous […]

The post Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/tor-network-suffers-ip-spoofing-attack-via-non-exit-relays/feed/ 0
Metasploit Framework Released with New Features https://gbhackers.com/metasploit-framework-released/ https://gbhackers.com/metasploit-framework-released/#respond Mon, 11 Nov 2024 08:08:32 +0000 https://gbhackers.com/?p=114714 The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced an exciting new release packed with cutting-edge features. The latest update includes new payloads targeting the emerging RISC-V architecture, a sophisticated SMB-to-HTTP(S) relay exploit for Active Directory Certificate Services (AD CS), and several new modules addressing high-profile vulnerabilities. These additions […]

The post Metasploit Framework Released with New Features appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/metasploit-framework-released/feed/ 0
Threat Actors Allegedly Claim Leak of 489 Million Lines of Instagram Data https://gbhackers.com/leak-of-instagram-data/ https://gbhackers.com/leak-of-instagram-data/#respond Mon, 11 Nov 2024 07:11:11 +0000 https://gbhackers.com/?p=114705 A threat actor has allegedly scraped 489 million lines of Instagram user data, including sensitive information, which is now reportedly being sold on the dark web. DarkWebInformer’s official X account revealed the alarming incident, raising concerns over the scale and potential impact of the breach. The compromised data includes many user details, such as usernames, […]

The post Threat Actors Allegedly Claim Leak of 489 Million Lines of Instagram Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/leak-of-instagram-data/feed/ 0
Threat Actors Allegedly Claim Leak of Harley-Davidson Database https://gbhackers.com/leak-of-harley-davidson-database/ https://gbhackers.com/leak-of-harley-davidson-database/#respond Mon, 11 Nov 2024 06:23:17 +0000 https://gbhackers.com/?p=114701 Threat actors known as “888” have allegedly leaked the database of Appleton Harley-Davidson, a prominent dealership affiliated with the iconic motorcycle brand. The breach, first reported by DarkWebInformer on their account on X, has sparked concerns over the safety of customer data and the broader implications for cybersecurity in the retail automotive sector. Leak of […]

The post Threat Actors Allegedly Claim Leak of Harley-Davidson Database appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/leak-of-harley-davidson-database/feed/ 0
CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks https://gbhackers.com/cisa-warns-of-critical-palo-alto-networks-vulnerability-exploited-in-attacks/ https://gbhackers.com/cisa-warns-of-critical-palo-alto-networks-vulnerability-exploited-in-attacks/#respond Fri, 08 Nov 2024 06:15:17 +0000 https://gbhackers.com/?p=114630 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns organizations of a critical vulnerability in Palo Alto Networks’ Expedition tool, which could lead to severe security breaches. The vulnerability, CVE-2024-5910, is classified as a “Missing Authentication” flaw that potentially allows attackers with network access to take control of an Expedition admin account. According to CISA’s […]

The post CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cisa-warns-of-critical-palo-alto-networks-vulnerability-exploited-in-attacks/feed/ 0
Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information https://gbhackers.com/cisco-desk-phone-series-vulnerability/ https://gbhackers.com/cisco-desk-phone-series-vulnerability/#respond Thu, 07 Nov 2024 12:28:08 +0000 https://gbhackers.com/?p=114625 A significant vulnerability (CVE-2024-20445) has been discovered in Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 that could allow remote, unauthenticated attackers to access sensitive information. This vulnerability, classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), is due to improper storage of sensitive information within the web […]

The post Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cisco-desk-phone-series-vulnerability/feed/ 0
Cisco Flaw Let Attackers Run Command as Root User https://gbhackers.com/cisco-flaw-attackers-run-command-root-user/ https://gbhackers.com/cisco-flaw-attackers-run-command-root-user/#respond Thu, 07 Nov 2024 06:03:54 +0000 https://gbhackers.com/?p=114613 A critical vulnerability has been discovered in Cisco Unified Industrial Wireless Software, which affects Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points. This flaw tracked as CVE-2024-20418 enables unauthenticated, remote attackers to perform command injection attacks and execute arbitrary commands as the root user on the underlying operating system of the affected devices. Vulnerability Details – […]

The post Cisco Flaw Let Attackers Run Command as Root User appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cisco-flaw-attackers-run-command-root-user/feed/ 0
Researchers Detailed Credential Abuse Cycle https://gbhackers.com/credential-abuse-cycle-research/ https://gbhackers.com/credential-abuse-cycle-research/#respond Wed, 06 Nov 2024 12:33:49 +0000 https://gbhackers.com/?p=114584 The United States Department of Justice has unsealed an indictment against Anonymous Sudan, a hacking group responsible for distributed denial-of-service attacks.  LameDuck, a new threat actor, has carried out several massive distributed denial of service (DDoS) attacks to affect critical infrastructure, cloud providers, and various industries.  The group leverages social media to amplify its impact […]

The post Researchers Detailed Credential Abuse Cycle appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/credential-abuse-cycle-research/feed/ 0