Loading...

Follow GBHackers On Security on Feedspot

Continue with Google
Continue with Facebook
or

Valid

A critical security flaw dubbed “Media File Jacking” affected WhatsApp and Telegram for Android let hackers manipulate both apps media files if users enable certain features. Threat actors are able to intercept and manipulate media file without the user’s knowledge when a pause in continuity in-between time when media files received through the apps that […]

The post Media File Jacking – New Flaw Let Hackers Manipulate WhatsApp and Telegram Media Files in Android appeared first on GBHackers On Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

A critical remote code execution vulnerability in WordPress plugin Ad Inserter, let hackers execute arbitrary PHP code in the vulnerable installations. The vulnerability was discovered by Wordfence security team and the vulnerability can be executed only by the authenticated users starting from Subscribers to above user levels. The Ad Inserter used on over 200,000 websites […]

The post Critical Vulnerability in WordPress Ad Inserter Plugin Let Hackers to Execute Arbitrary PHP Code appeared first on GBHackers On Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

A security researcher reported a critical vulnerability that allows malicious hackers to hack an Instagram account and take complete control of your Instagram account within 10 minutes. Facebook and Instagram are frequently fixing several vulnerabilities discovered by the internal team and also the bugs reported by external independent security researchers. The social media giant recently […]

The post Critical Account Take over Vulnerability Allows to Hack Your Instagram Account within 10 Minutes appeared first on GBHackers On Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Web-based applications security relies on a number of factors among them is a Web Application Firewall (WAF). Cyberattacks are pouring in numbers and users will need an effective WAF to take care of their web-accessible data. Organizations that are in-route to procure a Web Application Firewall should first understand the business demands, technical aspects of […]

The post Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider appeared first on GBHackers On Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

National cybersecurity center issued an alert for ongoing DNS hijacking attack, a large-scale global campaign that targets various countries around the world. NCSC recently observed various targeted attacks that exploit the Domain Name System (DNS) to deface or take down the websites and steal sensitive data. DNS hijacking attack performs unauthorized alteration of DNS entries […]

The post Ongoing DNS Hijacking Attack – NCSC Alert for Organizations and Mitigations appeared first on GBHackers On Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Microsoft released Windows 10 Insider Preview Build (20H1) to Windows Insiders in the Fast ring that includes the support for passwordless authentication and Phone screen support for surface devices. If you are a part of a Windows Insider in the Fast ring, then you can update by going into settings > Update & Security > […]

The post Microsoft going for Passwordless login for Windows 10 – bye! bye! for Passwords appeared first on GBHackers On Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Federal Trade Commission (FTC) approved $5 billion fine against Facebook for 2018 Cambridge Analytica scandal User-privacy Violations that affected 10 of millions of Facebook users. Last year Cambridge Analytica gained access overall 87 million Facebook users data which has been used to attempt to influence elections in the US, India, and Russia Since 2014. This […]

The post Facebook Facing $5 Billion Fine From Federal Trade Commission for 2018 Cambridge Analytica Scandal appeared first on GBHackers On Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Intel released new security updates with the fixes of two vulnerabilities that affected Intel Processor Diagnostic Tool and Solid State Drives (SSD) for Data Centers (DC) S4500/S4600 Series. Vulnerability in Processor Diagnostic Tool categorized as “High” Severity and the other vulnerability that affected Solid State Drives (SSD) S4500/S4600 Series marked as “Medium” Severity. Intel Processor […]

The post Vulnerability in Intel Processor Diagnostic Tool Let Hackers Perform Escalation of Privilege and DOS Attack appeared first on GBHackers On Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

A new Mirai variant dubbed Miori uses text-based protocols to establish communication with command-and-control (C&C) servers. The Miori campaign was identified in last year December, exploiting vulnerability n the ThinkPHP programming framework. Miori targets IoT devices and exploits them by taking advantage of the vulnerabilities and integrate them to the botnet network to launch various […]

The post New Miori Malware Uses Text-based Protocol to Communicate with C&C Server for Launching a DDoS Attack appeared first on GBHackers On Security.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Earlier this year an experienced team of researchers at Northeastern University’s Khoury College of Computer Sciences in Boston proved that an airliner’s complex radio-navigation system can be hacked by a $600 software-defined radio. The SDR (Software-defined radio), which is available commercially, was used to spoof the radio signals from a plane’s instrument landing system (ILS). This was […]

The post Radio Tech Used to Hack Everything From Airplanes to Defibrillators appeared first on GBHackers On Security.

Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview