Aggregator
CVE-2024-10260 | Tripetto Plugin up to 8.0.3 on WordPress Form File Upload cross site scripting
CVE-2024-10793 | WP Activity Log Plugin up to 5.2.1 on WordPress User_id cross site scripting
CVE-2024-10825 | Hide My WP Ghost Plugin up to 5.3.01 on WordPress cross site scripting
CVE-2024-49025 | Microsoft Edge up to 130.0.2849.46 exposure of private personal information to an unauthorized actor (Nessus ID 211402)
Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data
A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox, has been uncovered, targeting healthcare services in North America. The attackers exploited Philips DICOM Viewer software to deploy malicious payloads, including a backdoor remote access tool (RAT), a keylogger, and a crypto miner. This campaign highlights the evolving tactics of […]
The post Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ghostwriter Malware Targets Government Organizations with Weaponized XLS File
A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has been detected, targeting government and military entities in Ukraine and opposition groups in Belarus. The campaign, active since late 2024, employs weaponized Excel (XLS) files embedded with malicious macros to deliver malware payloads, underscoring the evolving sophistication of state-sponsored cyber-espionage […]
The post Ghostwriter Malware Targets Government Organizations with Weaponized XLS File appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
GitLab security advisory (AV25-106)
Water Utility Co. Still Paying the Breach Price a Year Later
LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager
The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial appearance in November 2024. Known for encrypting files with the .lcryx extension and demanding $500 in Bitcoin for decryption, this ransomware has evolved with advanced techniques to lock down Windows systems and evade detection. Disabling System Tools and Elevating Privileges […]
The post LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-49777 | tsMuxer nightly-2024-03-14-01-51-12 MKV Video File heap-based overflow (Issue 842)
CVE-2024-10104 | Jobs for WordPress Plugin up to 2.7.7 on WordPress Setting cross site scripting
CVE-2024-40579 | Virtuozzo Hybrid Server 1.7.1 hostname cross site scripting
CVE-2024-39610 | unclebob FitNesse 20220319 cross site scripting
CVE-2024-49778 | tsMuxer nightly-2024-05-12-02-01-18 MOV Video File heap-based overflow (Issue 879)
CVE-2024-41209 | tsMuxer nightly-2024-03-14-01-51-12 MOV Video File heap-based overflow (Issue 841)
CVE-2024-41206 | tsMuxer nightly-2024-03-14-01-51-12 TS Video File stack-based overflow (Issue 859)
CVE-2024-51688 | FraudLabs Pro SMS Verification Plugin up to 1.10.1 on WordPress cross-site request forgery
Hunters
Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications
Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection during malware distribution. Attackers are leveraging ephemeral port 60102, typically reserved for temporary communications, as a service port for covert malware transmission. This approach bypasses traditional monitoring systems, which often focus on scanning standard service ports such as 80 or […]
The post Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.