A Massive Hacking Toolkit From "You Dun" Threat Group Developed To Lauch Massive Cyber Attack
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Nov 11:12
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Nov 11:12
comments (0)
Xerox Printers Vulnerable to Remote Code Execution Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Oct 12:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Oct 12:23
comments (0)
Mallox Ransomware Vulnerability Let Victims Decrypt Files
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Oct 13:44
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Oct 13:44
comments (0)
IcePeony Hackers Exploiting Public Web Servers To Inject Webshells
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Oct 13:39
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 23 Oct 13:39
comments (0)
VMware HCX Platform Vulnerable to SQL Injection Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Oct 2024 11:56
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Oct 2024 11:56
comments (4)
Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 2024 12:19
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 15 Oct 2024 12:19
comments (1)
Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Oct 2024 14:56
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Oct 2024 14:56
comments (4)
Multiple VMware NSX Vulnerabilities Let Attackers Gain Root Access
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 2024 11:45
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Oct 2024 11:45
comments (0)
Open-Source Scanner Released to Detect CUPS Vulnerability
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 2024 11:29
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 2024 11:29
comments (0)
Hackers Gained Unauthorized Network Access to Casio Networks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 2024 11:24
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Oct 2024 11:24
comments (2)
19.6K+ Public Zimbra Installations Vulnerable to Code Execution Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 2024 12:51
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 07 Oct 2024 12:51
comments (0)
Prince Ransomware Hits UK and US via Royal Mail Phishing Scam
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Oct 2024 11:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Oct 2024 11:02
comments (0)
Cisco Nexus Vulnerability Let Hackers Execute Arbitrary Commands on Vulnerable Systems
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 2024 12:02
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 03 Oct 2024 12:02
comments (0)
New Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairing
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 2024 12:00
comments (10)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Oct 2024 12:00
comments (10)
CISA Warns of Four Vulnerabilities that Exploited Actively in the Wild
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 2024 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Oct 2024 11:58
comments (0)
GorillaBot Emerged As King For DDoS Attacks With 300,000+ Commands
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 2024 16:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 30 Sep 2024 16:27
comments (0)
Researcher Details Cisco Smart Licensing that Lets Attacker Control Device
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 2024 10:27
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Sep 2024 10:27
comments (0)
PoC Exploit Released for CVE-2024-7965 Zero-Day Chrome Vulnerability
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 2024 10:59
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 2024 10:59
comments (0)
Hackers Using Supershell Malware To Attack Linux SSH Servers
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 2024 10:57
comments (5)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 2024 10:57
comments (5)
Hertz Car Rental Platform Leaks 60,000 Insurance Claim Reports
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 2024 10:47
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 20 Sep 2024 10:47
comments (0)
Medusa Ransomware Exploiting Fortinet Flaw For Sophisticated Ransomware Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Sep 2024 09:34
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Sep 2024 09:34
comments (0)
Citrix Workspace App Vulnerable to Privilege Escalation Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Sep 2024 12:05
comments (13)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Sep 2024 12:05
comments (13)
New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 2024 11:30
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 11 Sep 2024 11:30
comments (1)
Threat Actors Allegedly Claiming Leak of Capgemini Data
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 2024 10:23
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 10 Sep 2024 10:23
comments (0)
SonicWall Access Control Vulnerability Exploited in the Wild
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 2024 12:31
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Sep 2024 12:31
comments (0)
PoC Exploit Released For 0-Day Windows Kernel Privilege Escalation Vulnerability
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 2024 11:40
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Sep 2024 11:40
comments (3)
PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:19
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 13 Aug 2024 12:19
comments (7)
DISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Aug 2024 11:58
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 09 Aug 2024 11:58
comments (0)
Record Breaking DDoS Attack 419 TB of Malicious Traffic Within 24-Hours
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Aug 2024 12:54
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 08 Aug 2024 12:54
comments (0)
40 French Museums IT Systems Hit by Ransomware Attack
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2024 11:28
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 06 Aug 2024 11:28
comments (0)
Researchers Details How Hackers Can Steal Passwords via HDMI Cables
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2024 12:00
comments (7)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Aug 2024 12:00
comments (7)
Microsoft Patched a Critical Edge Flaw that Led to Arbitrary Code Execution
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Aug 2024 11:46
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 02 Aug 2024 11:46
comments (0)
Meta paid a $1.4 Billion Settlement for the Unauthorized Capture of Personal Biometric Data
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 2024 12:51
comments (2)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 31 Jul 2024 12:51
comments (2)
Play & LockBit Ransomware Join Hands to Launch Cyber Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jul 2024 14:08
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 26 Jul 2024 14:08
comments (0)
Play Ransomware’s Linux Variant Attacking VMware ESXi Servers
(gbhackers.com)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 23 Jul 2024 07:19
comments (0)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 23 Jul 2024 07:19
comments (0)
GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 2024 11:38
comments (1)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 16 Jul 2024 11:38
comments (1)
Cloudflare Details 1.1.1.1 Service Outage Incident
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jul 2024 12:14
comments (4)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 05 Jul 2024 12:14
comments (4)
Microsoft Alerts More Users in Update to Midnight Blizzard Hack
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 2024 13:07
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 01 Jul 2024 13:07
comments (0)
Chinese Winnti Group Intensifies Financially Motivated Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 2024 11:33
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Jun 2024 11:33
comments (0)
Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 2024 12:04
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 17 Jun 2024 12:04
comments (0)
Charon Android Botnet Made a Comeback With New Weapons
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 2024 12:01
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Jun 2024 12:01
comments (0)
8220 Gang Exploiting Oracle WebLogic Server Flaw To Deploy Cryptominer
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jun 2024 11:52
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 04 Jun 2024 11:52
comments (0)
Volkswagen Group’s Systems Hacked: 19,000+ Documents Stolen
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Apr 2024 12:05
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 24 Apr 2024 12:05
comments (0)
Exploring How Penetration Tests Are Classified
(gbhackers.com)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 09 Apr 2024 04:31
comments (0)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 09 Apr 2024 04:31
comments (0)
AI Package Hallucination - Abusing ChatGPT, Gemini to Spread Malware
(gbhackers.com)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 05 Apr 2024 06:35
comments (0)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 05 Apr 2024 06:35
comments (0)
DinodasRAT Linux Malware Attack On Linux Servers To Gain Backdoor Access
(gbhackers.com)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 01 Apr 2024 08:55
comments (0)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 01 Apr 2024 08:55
comments (0)
Hackers Using Microsoft OneNote Files To Orchestrate Cyber Attacks
(gbhackers.com)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 01 Apr 2024 08:52
comments (0)
in cybersecurity@sh.itjust.works from Lanky_Pomegranate530@midwest.social on 01 Apr 2024 08:52
comments (0)
Andariel Hackers Attacking Asset Management Companies To Inject Malicious Code
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 2024 11:55
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 14 Mar 2024 11:55
comments (0)
CyberGate RAT Mimic As Dorks Tool To Attack Cybersecurity Professionals
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 2024 11:58
comments (3)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 12 Mar 2024 11:58
comments (3)
Anonymous Sudan Promoting New DDoS Botnet: Beware
(gbhackers.com)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Feb 2024 11:57
comments (0)
in cybersecurity@sh.itjust.works from kid@sh.itjust.works on 27 Feb 2024 11:57
comments (0)