Category: GBHackers On Security

Microsoft Warns Customers to Fix Critical TCP/IP Bugs

Read the original article: Microsoft Warns Customers to Fix Critical TCP/IP Bugs Microsoft released a set of fixes affecting Windows TCP/IP implementation that include two Critical Remote Code Execution (RCE) vulnerabilities (CVE-2021-24074, CVE-2021-24094) and an important Denial of Service (DoS)…

Protect Your WordPress sites with CrowdSec

Read the original article: Protect Your WordPress sites with CrowdSec The CrowdSec team is expanding the capabilities of their open source and free security solution by finalizing the release of its brand new application bouncer on the WordPress marketplace. This…

Your Guide to Endpoint Security

Read the original article: Your Guide to Endpoint Security With tens of millions of cyber attacks occurring every single day, cyber-security has quite simply never been so important. Today’s world is increasingly dependent on connected devices and digital systems, both…

Tesla Sues Former Employee for Stealing Sensitive Data

Read the original article: Tesla Sues Former Employee for Stealing Sensitive Data Tesla, Inc., an American electric car manufacturing company based in Palo Alto, California has sued a former employee and software engineer named ‘Alex Khatilov’ alleging trade secret theft…

Livecoin has Announced Shutdown of Services after Being Hacked

Read the original article: Livecoin has Announced Shutdown of Services after Being Hacked Livecoin Exchange announces closure following an alleged breach in December. The trading platform declares it will close and repay users any remaining funds. Livecoin servers were compromised…

TA551 Hacker Group Pushes New Information Stealer Malware IcedID

Read the original article: TA551 Hacker Group Pushes New Information Stealer Malware IcedID TA551 also known as Shathak is an email-based malware distribution campaign that frequently targets English-speaking victims. This campaign has aimed German, Italian and Japanese speakers. TA551 in…

Catch the Unknown Cyber-Attacks with Threat Hunting

Read the original article: Catch the Unknown Cyber-Attacks with Threat Hunting The “reactive trend” of Cyberthreat monitoring is a very essential issue since it demonstrates that most organizations don’t hunt until the event is identified. They respond simply to intrusion…

Most Advanced CrowdSec IPS v.1.0.x is out: how-to guide

Read the original article: Most Advanced CrowdSec IPS v.1.0.x is out: how-to guide We are happy to announce the official release of CrowdSec v.1.0.x which introduces several improvements to the previous version, including a major architectural change: the introduction of…

Secret Backdoor found Installed in Zyxel Firewall and VPN

Read the original article: Secret Backdoor found Installed in Zyxel Firewall and VPN Zyxel Communications Corp. is a manufacturer of networking devices. It is popular for firewalls that are marketed towards small and medium businesses. Their Unified Security Gateway (USG) product…

Converting Your Android Smartphone into Penetration Testing Device

Read the original article: Converting Your Android Smartphone into Penetration Testing Device Big corporations trying to improve the user experience by making everything around simplify, increasing performance and connections with “IoT’s”. Today with the Android operating system installed on the…

New SUPERNOVA Backdoor Found in SolarWinds Cyberattack Analysis

Read the original article: New SUPERNOVA Backdoor Found in SolarWinds Cyberattack Analysis An analysis reports the detection of a backdoor possibly developed by the unidentified hacking team involved in the attack; known as Supernova, this is a web shell injected into SolarWinds…

NSA Warns of Cloud Attacks on Authentication Mechanisms

Read the original article: NSA Warns of Cloud Attacks on Authentication Mechanisms The US National Security Agency (NSA) published a security advisory, warning about two techniques abused by threat actors for escalating attacks from local networks to cloud infrastructure. The…

Flaws with PoS Terminals Let Attackers Execute Arbitrary Code

Read the original article: Flaws with PoS Terminals Let Attackers Execute Arbitrary Code Researchers describe the intense vulnerabilities in the two biggest Point of Sales (PoS) vendors, Verifone, and Ingenico. The affected devices are Verifone VX520, Verifone MX series, and…

Live Cyber Forensics Analysis with Computer Volatile Memory

Read the original article: Live Cyber Forensics Analysis with Computer Volatile Memory The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form (that is, digital evidence).…

‘Amnesia:33’ TCP/IP Flaws Affect Millions of IoT Devices

Read the original article: ‘Amnesia:33’ TCP/IP Flaws Affect Millions of IoT Devices Forescout Research Labs has launched Project Memoria, an initiative that aims at providing the community with the most important study on the security of TCP/IP stacks. AMNESIA:33 is…

Operating Systems Can be Detected Using Ping Command

Read the original article: Operating Systems Can be Detected Using Ping Command Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, which used to find the Availability of a host on an Internet…

Most Important Network Penetration Testing Checklist

Read the original article: Most Important Network Penetration Testing Checklist Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services,…

North Korean Hackers Targeted COVID Vaccine Maker AstraZeneca

Read the original article: North Korean Hackers Targeted COVID Vaccine Maker AstraZeneca British pharmaceutical company AstraZeneca, one of the manufacturers leading the way towards developing a Covid-19 vaccine, has been targeted by North Korean hackers.  Suspected North Korean hackers have…

cPanel 2FA Bypass Exposes Tens of Millions of Websites to Hack

Read the original article: cPanel 2FA Bypass Exposes Tens of Millions of Websites to Hack Digital Defense, Inc., a leader in vulnerability and threat management solutions, announced that its Vulnerability Research Team (VRT) exposed a previously undisclosed vulnerability affecting the cPanel & WebHost…

Telsa Flaw Let Attackers to Steal Vehicles in Minutes

Read the original article: Telsa Flaw Let Attackers to Steal Vehicles in Minutes 90 seconds and $195 is all it takes to steal your brand new $100,000 Tesla Model X!! Computer Security and Industrial Cryptography (COSIC) Researchers from the University…

Surprising Differences Between TLS and SSL Protocol

Read the original article: Surprising Differences Between TLS and SSL Protocol TLS is simply a successor of SSL 3.0, TLS is a protocol which provides Data encryption and Integrity between communication channels. SSL 3.0 is served as a base for…