Browsing category

Computer Security

Computer Security, cross site scripting attack, cross-site scripting, OWASP - Top 10, what is XSS, XSS, XSS attack, xss prevention, xss vulnerability,

What is XSS (Cross Site Scripting) ? – A Detailed Understanding the Type of XSS

XSS

XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable and also it is one of the important vulnerability in OWASP TOP 10. What is XSS( Cross Site Scripting )? An attacker can inject untrusted snippets of JavaScript into your application without validation. This JavaScript is then executed by […]

The post What is XSS (Cross Site Scripting) ? – A Detailed Understanding the Type of XSS appeared first on GBHackers On Security.

AZORult Malware, Computer Security, Cyber Attack, Malware, RDP, RDP Protocol, Uncategorized,

AZORult Malware Abusing RDP Protocol To Steal the Data by Establish a Remote Desktop Connection

Sophisticated AZORult Malware emerging with a new form with advanced information stealing modules that capable of stealing sensitive information from infected computers. AZORult is one of the well-known malware that often sold in Russian forums for the higher price ($100) since this malware contains a broad range of persistent functionality. It using .bit domains in […]

The post AZORult Malware Abusing RDP Protocol To Steal the Data by Establish a Remote Desktop Connection appeared first on GBHackers On Security.

Browser Vulnerability, Computer Security, explo, Exploit, Exploit Browser, hacking, IoT, Pwn2Own, Uncategorized, ZERO day,

Pwn2Own 2019 – Tesla Car Internet Browser Hacked – Hackers Won the Car & $545,000 in Total – Day 3

First and the second-day contest ended up with a various successful attempt to exploit the different bugs in multiple software vendors including, Microsoft, VMware, Oracle and Apple. In Pwn2Own 2019 final day, Zero Day Initiative introduced the Tesla car in automotive category and the Fluoroacetate team made an attempt to exploit the Tesla Model 3 […]

The post Pwn2Own 2019 – Tesla Car Internet Browser Hacked – Hackers Won the Car & $545,000 in Total – Day 3 appeared first on GBHackers On Security.

Anti Virus, Backdoor, Computer Security, Exploit, Exploitation Tools, Infosec- Resources, Msfvenom, therat, trojan, Veil Framework,

Malicious Payload Evasion Techniques with Advanced Exploitation Frameworks

Sophisticated threats are Evolving with much more advanced capabilities and giving more pain for analysis even evade the advanced security software such as Antivirus. This comparison is made by the payload ability to bypass the default security frameworks accessible on Windows machines and antivirus systems available, searching for an approach to get a payload that […]

The post Malicious Payload Evasion Techniques with Advanced Exploitation Frameworks appeared first on GBHackers On Security.

Computer Security, domain, Load Balancer, proxy, scan domain, Server,

Load Balancer – How Does it Work With Reconnaissance Phase During Penetration Testing?

Load Balancer

Load Balancer basically performs to distribute the network traffic across the multiple servers to improve the network, application performance. the Reconnaissance work on target to find out target domain has a load balancer so that penetration testing does not misdirect your probs or attacks. So Its recommended to check the domain has a Load balancer, […]

The post Load Balancer – How Does it Work With Reconnaissance Phase During Penetration Testing? appeared first on GBHackers On Security.

"Edge", Computer Security, Ethical Hackers, Exploit, Firefox, Pwn2Own, Pwn2Own 2019, Uncategorized, vmware, Vulnerability, Windows, ZDI, ZERO day,

Pwn2Own 2019 – Firefox, Edge, Windows, VMware Hacked – Ethical Hackers Earned $270,000 USD in Day 2

Pwn2Own

In the second day of Pwn2Own 2019 contest, Ethical Hackers compromised Microsoft Edge, Mozilla Firefox, Windows, VMware and earned $270,000 USD in a single day by submitting 9 unique zero-day exploits. The first day, 2 teams of researchers and 2 independent researchers have been made $240,000 USD by reporting 9 zero-day bugs in Safari, VMware, […]

The post Pwn2Own 2019 – Firefox, Edge, Windows, VMware Hacked – Ethical Hackers Earned $270,000 USD in Day 2 appeared first on GBHackers On Security.

banking malware, Computer Security, Cyber Attack, Cyber Crime, Cyber Security News,

Organized Cybercrime – Hacker Groups Work Together To Distribute Banking Malware Globally

banking malware

The banking malware considered a top threat, it allows a malware developer an easy way to gain access to someone and cause serious damage. According to the reports, the cybercrime costs more than $600 billion in 2017 and for 2018 predicted $1.5 trillion in losses. Hacker groups continue to exchange their scripts, tactics, and techniques […]

The post Organized Cybercrime – Hacker Groups Work Together To Distribute Banking Malware Globally appeared first on GBHackers On Security.

Cisco, Cisco Security updates, cisco vulnerability, Computer Security, hacking, Network Security, Security News, security updates,

Cisco Released Security Updates – Hackers Execute Arbitrary Code In Vulnerable Cisco Devices

Cisco released security updates with the fixes for several vulnerabilities that affected Cisco products let attackers execute arbitrary code in one of the vulnerable Cisco devices. It consists of 10 vulnerabilities that affected different Cisco products in which, all the vulnerabilities are categorized under “High” severity. A remote code execution CVE-2019-1716 vulnerability that exists in […]

The post Cisco Released Security Updates – Hackers Execute Arbitrary Code In Vulnerable Cisco Devices appeared first on GBHackers On Security.

Computer Security, DNS Security, Infosec- Resources, Internet,

DNS Security: How to Reduce the Risk of a DNS attack.

DNS Security

Domain Name System or DNS is one of the foundational elements of the entire internet; however, unless you specialize in networking, you probably don’t realize how important it is. DNS is essentially like a phone book of numbers that computers use for communication. Specifically, these numbers are IP addresses. This directory is stored on domain […]

The post DNS Security: How to Reduce the Risk of a DNS attack. appeared first on GBHackers On Security.

Android, Android Q, Computer Security, Cyber Security News, Google, Internet, Privacy, Security, TLS 1.3,

Android Q – Beta Released with High Level Privacy and Security Features With TLS 1.3 Support

Android Q

Google released a new Beta version of Android Q that brings a number of additional privacy and security features for Android users. Since Android reached a billion users, Google has a great responsibility to ensure the user’s privacy and security from the sophisticated cyber threats that evolving day by day. Apart from this existing privacy […]

The post Android Q – Beta Released with High Level Privacy and Security Features With TLS 1.3 Support appeared first on GBHackers On Security.