Guru Baran
Guru is an Ex-Security Engineer at Comodo Cybersecurity.
Co-Founder - Cyber Security News & GBHackers On Security.
Critical Cisco WAN Manager Vulnerabilities Let Attacker Conduct DoS Attack
Cisco, a prominent player in the world of networking and cybersecurity, has issued a critical security advisory concerning multiple vulnerabilities in their Catalyst SD-WAN Manager, formerly known as Cisco SD-WAN vManage. These vulnerabilities could potentially open doors for cyber attackers...
Actively Exploited Chrome Zero-day Patched: Update Now!
Google has recently deployed updates to mitigate a newly discovered zero-day vulnerability in their Chrome browser, which is currently being actively exploited.Google has acknowledged its awareness of an exploit currently available for CVE-2023-5217, which has been observed to be...
BlackTech APT Hackers Break into Cisco Firmware to Attack the US and Japan
Since 2010, a group of hackers known as BlackTech APT has been engaging in malicious activities. The targets of their attacks encompass a wide range of sectors, including governmental institutions, industrial facilities, technological infrastructure, media outlets, electronic systems, mobile...
Google Chrome use-after-free Vulnerability Leads to Remote Attack
Google Chrome has been recently discovered to be a Use-after-free vulnerability that threat actors can exploit to attack users. This vulnerability exists in the Google Chrome VideoEncoder, which can be triggered using a malicious web page.However, Google Chrome version...
Millions Of Newborn Registry Records Were Compromised In A MOVEit Data Breach
The Progress MOVEit software's vulnerability resulted in a cybersecurity breach that affected BORN (the Better Outcomes Registry & Network), which gathers data on pregnancies, births, the postpartum period, and childhood.Unauthorized copies of files containing sensitive personal health data were obtained...
Threat Actors Actively Using Remote Management Tools to Deploy Ransomware
The threat actors have been spotted increasingly depending on Remote Management and Monitoring (RMM) tools, which resulted in a relatively botched Hive ransomware distribution. The original payload consisted of an executable file disguised as a legitimate document. According to Huntress, this campaign was...