-
A significant vulnerability was discovered in BlueStacks, the worldβs fastest Android emulator and cloud gaming platform. When used against a victim, this gives attackers complete access to the machine. The American technology business BlueStacks, also known as BlueStacks by now.gg, Inc., is well-known for developing the BlueStacks App Player and other cloud-based cross-platform applications. The [β¦] The post BlueStacks Emulator For Windows Flaw Exposes Millions Of Gamers To Cyber Attack appeared first on GBHackers on Security | #1 Globally Trusted…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Google has unveiled the latest version of its Chrome browser, Chrome 127, which is now available on the Stable channel. The update, identified as version 127.0.6533.72/73 for Windows and Mac, and 127.0.6533.72 for Linux, will be rolled out over the coming days and weeks. This release addresses 24 security vulnerabilities, enhancing the browserβs security and [β¦] The post Google Chrome 127 Released with a fix for 24 Security Vulnerabilities appeared first on GBHackers on Security | #1 Globally Trusted Cyber…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
SonicWall has disclosed a critical heap-based buffer overflow vulnerability in its SonicOS IPSec VPN. This flaw, identified as CVE-2024-40764, can potentially allow unauthenticated, remote attackers to cause a Denial of Service (DoS) condition. The vulnerability has been rated with a CVSS v3 score of 7.5, indicating a high severity level. CVE-2024-40764: Critical Vulnerability in SonicOS [β¦] The post SonicOS IPSec VPN Vulnerability Let Attackers Cause Dos Condition appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
HTTP Request Smuggling is a flaw in web security that is derived from variations in the way different web servers or intermediaries, such as load balancers and proxies handle HTTP request sequences. By creating malicious HTTP requests that exploit these inconsistencies, an attacker can control the order in which requests are processed, possibly resulting in [β¦] The post New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
MirrorFace threat actors have been targeting media, political organizations, and academic institutions since 2022, shifting focus to manufacturers and research institutions in 2023.Β The attack method evolved from spear phishing to exploiting vulnerabilities in external assets, specifically in Array AG and FortiGate products, while the actors deploy NOOPDOOR malware and use various tools to exfiltrate [β¦] The post MirrorFace Attacking Organizations Exploiting Vulnerabilities In Internet-Facing Assets appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Hackers often target NuGet as itβs a popular package manager for .NET, which developers widely use to share and consume reusable code.Β Threat actors can distribute malicious code to many projects by compromising the NuGet packages. In August 2023, ReversingLabs detected a malicious campaign against NuGet and noticed the change in techniques used by the [β¦] The post Malicious NuGet Campaign Tricking Developers To Inject Malicious Code appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Airlines often become the target of hackers as they contain sensitive personal and financial details of passengers as well as travel schedules and loyalty programs. Since airlines are attractive to threat actors, disrupting their operations can be quite damaging to their economic and reputational statuses. Cybersecurity researchers at BlackBerry discovered that in Latin America, an [β¦] The post Akira Ransomware Attacking Airline Industry With Legitimate Tools appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
EBooks are popular, and their popularity lucrative threat actors the most, as they are widely shared digital assets that can easily circumvent security measures.Β Threat actors exploit usersβ trust in seemingly harmless documents by embedding malware in eBook files or disguising malicious code as legitimate eBooks. ASEC researchers reported that AsyncRAT distribution is via multiple [β¦] The post Beware Of Weaponized EBooks That Deliver AsyncRAT appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Multiple international cybersecurity agencies jointly warn of a PRC state-sponsored cyber group, linked to the Ministry of State Security and known by various names likeΒ APT40, Leviathan.Β The group, based in Hainan Province, has targeted organizations globally, including in Australia and the US.Β The Australian authorities recently released an advisory that provides case studies of [β¦] The post Chinese APT40 Is Ready To Exploit New Vulnerabilities Within Hours Of Release appeared first on GBHackers on Security | #1 Globally Trusted…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ
-
Hackers remotely execute malicious code on a compromised device or server by exploiting the Universal Code Execution vulnerability. Through this vulnerability, threat actors can inject codes into server-side interpreter languages such as Java, Python, and PHP. Hacking into this security flaw can steal information, divert money to other accounts, perform surveillance, and even severely affect [β¦] The post Universal Code Execution Vulnerability In Browsers Puts Millions Of Users At Risk appeared first on GBHackers on Security | #1 Globally Trusted…
ΒΆΒΆΒΆΒΆΒΆ
ΒΆΒΆΒΆΒΆΒΆ