How Does ANY RUN Sandbox Protect Enterprise Users By Utilizing Advanced Tools
GBHackers On Security
by Balaji
9h ago
Ensuring adherence to GDPR, the ANY RUN sandbox service employs TLS 1.3 for data in transit and AES-256 for data at rest; it is hosted in Germany and provides supplementary tools, predominantly for enterprise plans, to empower users with greater control over their data. When working in an ANY.RUN sandbox, where you frequently need to submit sensitive files for evaluation, the prospect of handing your data to a third party could be daunting. According to the details, ANY.RUN service appears to adhere to a security framework in line with the AICPA Trust Services Criteria. ANY.RUN’s Enterpri ..read more
Visit website
Free Workshop from Security Risk Advisors Empowers Organizations to Select Optimal OT Security Tools
GBHackers On Security
by Kaaviya Balaji
11h ago
Security Risk Advisors (SRA) announces the launch of their OT/XIoT Detection Selection Workshop, a complimentary offering designed to assist organizations in selecting the most suitable operational technology (OT) and Extended Internet of Things (XIoT) security tools for their unique environments.  Led by seasoned OT/XIoT security consultants, the workshop provides participants with an invaluable opportunity to gain insights into both best-in-class and novel solutions and identify those closest to their specific needs. In today’s increasingly interconnected digital landscape, choosing the ..read more
Visit website
CrushFTP Vulnerability Exploited in Wild to Execute Remote Code
GBHackers On Security
by Divya
13h ago
A critical vulnerability in CrushFTP, identified as CVE-2024-4040, has been actively exploited in the wild. It allows attackers to perform unauthenticated remote code execution on vulnerable servers. This severe security flaw affects versions of CrushFTP before 10.7.1 and 11.1.0, enabling attackers to bypass the Virtual File System (VFS) sandbox, gain administrative privileges, and potentially access sensitive files or execute arbitrary code remotely. Document Free Webinar : Live API Attack Simulation 94% of organizations experience security problems in production APIs, and one in five suffers ..read more
Visit website
Veeam RCE Flaws Let Hackers Gain Access To VSPC Servers
GBHackers On Security
by Eswar
15h ago
Veeam Service Provider console has been discovered with two critical vulnerabilities that were associated with Remote Code Execution. A CVE for these vulnerabilities is yet to be assigned. These vulnerabilities exist in version 7.x and version 8.x of the Veeam Service Provider Console. Document Free Webinar : Live API Attack Simulation 94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise: Key Takeaways: An exploit of OWASP API T ..read more
Visit website
Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users
GBHackers On Security
by Eswar
17h ago
A new critical vulnerability has been discovered in PDF.js, which could allow a threat actor to execute arbitrary code when opening a malicious PDF. PDF.js allows browsers to render PDF files without any plugins or external software.  This vulnerability affects multiple browsers and applications that use React-PDF. An interesting fact is that Mozilla PDF.js is the original open-source library that focuses on rendering PDF documents within a browser, and the React-PDF PDF.js is built upon Mozilla PDF.js and used for integrating PDF.js into React applications. With millions of users using P ..read more
Visit website
Hackers Actively Exploiting Ivanti Pulse Secure Vulnerabilities
GBHackers On Security
by Divya
17h ago
Juniper Threat Labs has reported active exploitation attempts targeting vulnerabilities in Ivanti Pulse Secure VPN appliances. These vulnerabilities, identified as CVE-2023-46805 and CVE-2024-21887, have been exploited to deliver the Mirai botnet, among other malware, posing a significant threat to network security worldwide. Document Free Webinar : Live API Attack Simulation 94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise ..read more
Visit website
Hackers Employing Steganography Methods to Deliver Notorious RemcosRAT
GBHackers On Security
by Divya
17h ago
Hackers are now using steganography techniques to distribute the notorious Remote Access Trojan (RAT) known as RemcosRAT. This method, which involves hiding malicious code within seemingly innocuous image files, marks a concerning evolution in malware delivery tactics. The Initial Breach: Word Documents and RTF Files The attack begins with a seemingly harmless Word document that contains an external link. This document employs a template injection technique designed to exploit vulnerabilities within the document’s processing. The AhnLab Security Intelligence Centre (ASEC) has recently found th ..read more
Visit website
Google Simplifies Two-Factor Authentication Setup Process
GBHackers On Security
by Guru baran
20h ago
Google has announced an update to its two-factor authentication (2FA) process, also known as 2-step Verification (2SV), aimed at simplifying the setup and making it easier for users to secure their accounts. The changes rolled out on Monday, May 6, 2024, will affect both personal and Google Workspace accounts. One of the key changes is the elimination of the requirement to provide a phone number before adding an authenticator app or hardware security key as the second verification step. Document Integrate ANY.RUN in Your Company for Effective Malware Analysis Are you from SOC, Threat Research ..read more
Visit website
Hunters Announces Full Adoption of OCSF and Introduces OCSF-Native Search
GBHackers On Security
by Cyber Press
1d ago
Hunters, the pioneer in modern SOC platforms, today announced its full adoption of the Open Cybersecurity Schema Framework (OCSF), coupled with the launch of groundbreaking OCSF-native Search capability. This strategic advancement underscores Hunters’ commitment to standardizing and enhancing cybersecurity operations through open, integrated data sharing frameworks. Uri May, CEO of Hunters, explained the strategic significance of this move, stating, “Adopting OCSF as our primary data model represents a transformative step in our journey to elevate cybersecurity operations. Alongside this, our ..read more
Visit website
UK Ministry of Defence System Hacked by Chinese Hackers
GBHackers On Security
by Guru baran
1d ago
Chinese state-sponsored hackers are highly sophisticated, leveraging advanced techniques and vast resources to conduct cyber espionage and steal sensitive data from Western governments, militaries, and critical infrastructure. The British government is expected to announce that personal details of UK military personnel were targeted in a cyber attack suspected to be carried out by Chinese state-sponsored hackers.  While the hack impacted an IT system of a UK Ministry of Defence contractor, it did not breach the central network of the MoD. Defence Contractor’s IT System Hacked Sky News lea ..read more
Visit website

Follow GBHackers On Security on FeedSpot

Continue with Google
Continue with Apple
OR