Divya

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.
Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense ScannerMetasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules, including a highly anticipated exploit…

1 day ago
Google Researchers Use Mach IPC to Uncover Sandbox Escape VulnerabilitiesGoogle Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an innovative approach that leverages Mach Interprocess…

1 day ago
Cybercriminals Hide Undetectable Ransomware Inside JPG ImagesCybercriminals Hide Undetectable Ransomware Inside JPG Images

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image files to deliver fully undetectable (FUD) ransomware,…

1 day ago
Microsoft Teams to Safeguard Meetings by Blocking Screen SnapsMicrosoft Teams to Safeguard Meetings by Blocking Screen Snaps

Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps

Microsoft has announced the upcoming release of a groundbreaking "Prevent Screen Capture" feature for Teams, designed to block unauthorized screenshots…

1 day ago
New Exploit Method Extracts Microsoft Entra Tokens Through BeaconNew Exploit Method Extracts Microsoft Entra Tokens Through Beacon

New Exploit Method Extracts Microsoft Entra Tokens Through Beacon

A novel exploit method leveraging Beacon Object Files (BOFs) has emerged, enabling attackers to extract Microsoft Entra (formerly Azure AD)…

1 day ago
PoC Code Published for Linux nftables Security VulnerabilityPoC Code Published for Linux nftables Security Vulnerability

PoC Code Published for Linux nftables Security Vulnerability

Security researchers have published proof-of-concept (PoC) exploit code for CVE-2024-26809, a high-severity double-free vulnerability in Linux’s nftables firewall subsystem. The flaw…

1 day ago
New Mamona Ransomware Targets Windows Systems Using Abused Ping CommandNew Mamona Ransomware Targets Windows Systems Using Abused Ping Command

New Mamona Ransomware Targets Windows Systems Using Abused Ping Command

Cybersecurity researchers are raising the alarm about a newly discovered commodity ransomware strain dubbed Mamona, which is rapidly spreading across Windows…

4 days ago
Hackers Exploit Host Header Injection to Breach Web ApplicationsHackers Exploit Host Header Injection to Breach Web Applications

Hackers Exploit Host Header Injection to Breach Web Applications

Cybersecurity researchers have reported a significant rise in web breaches triggered by a lesser-known technique: Host Header Injection. This sophisticated…

4 days ago
Hackers Exploit Windows Remote Management to Evade Detection in AD NetworksHackers Exploit Windows Remote Management to Evade Detection in AD Networks

Hackers Exploit Windows Remote Management to Evade Detection in AD Networks

A new wave of cyberattacks is targeting Active Directory (AD) environments by abusing Windows Remote Management (WinRM), a legitimate administrative…

4 days ago
FBI Warns Hackers Are Using End-of-Life Routers to Mask Their TracksFBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

FBI Warns Hackers Are Using End-of-Life Routers to Mask Their Tracks

The Federal Bureau of Investigation (FBI) has issued a stark warning to businesses and home users: cybercriminals are actively exploiting…

4 days ago