Browsing category

Internet

Airlines, Amadeus, Computer Security, Cyber Security News, Data Breach, data exposure, Internet, Internet Security, Online, Password Attacks, Security Hacker, Vulnerability,

141 Airlines Worldwide Affected by Biggest Security Vulnerability – Tens of Millions of Flight Travelers Affected

Researchers discovered a major security vulnerability in online flight ticket booking system that affected almost half of the fight travelers around the world. The Vulnerability was discovered by Noam Rotem , an Isreal security researcher when he was trying to book a flight in ELAL Israel Airlines. He uncovered this critical flaw in the widely […]

The post 141 Airlines Worldwide Affected by Biggest Security Vulnerability – Tens of Millions of Flight Travelers Affected appeared first on GBHackers On Security.

Backdoor, Computer Security, Cyber Security News, Hacking group, Internet, Malware, RAT, Security Hacker, Spam, Word documents,

TA505 Hacking Group Launching New Malware ServHelper via Weaponized MS Word Documents

TA505 threat actors currently launching new malware campaign with a backdoor capability that mainly target the financial institutions via MS Word Documents. TA505 hacking group already had a record of distributing biggest threat campaign  Dridex and widely distributing Locky ransomware that affected millions of computers around the world. ServHelper backdoor campaign observed in 2018 along with 2 different […]

The post TA505 Hacking Group Launching New Malware ServHelper via Weaponized MS Word Documents appeared first on GBHackers On Security.

Computer Security, Cyber Attack, eCommerce Platform, Internet, Network Security, Password Attacks, PCI DSS, Security Hacker,

A Rising of E-Commerce Cyber Attack & Most Dangerous Cyber Threats of 2019

Online E-commerce is the most trending business model that contributes to grow up various opportunities in online, as most of the customers are currently preferring online shopping that provides more flexibility in order to save time and other benefits. In the same time, cyber risk that involved in ecommerce business and online sales due to […]

The post A Rising of E-Commerce Cyber Attack & Most Dangerous Cyber Threats of 2019 appeared first on GBHackers On Security.

Computer Security, Cyber Security News, Data Leaked online, Internet, JIRA, Misconfiguration, NASA, Network Security, Security Hacker, Vulnerability,

NASA Data Leak – Internal App Leaked NASA Staff and Project Sensitive data

A erious Misconfiguration flaw that discovered in NASA internal App JIRA leaked sensitive internal data to the public and anyone can access the exposed data. JIRA is a project management system that powered by Atlassian that allows bug tracking and agile project management. Leaked data contains very sensitive information including internal user details, project details, […]

The post NASA Data Leak – Internal App Leaked NASA Staff and Project Sensitive data appeared first on GBHackers On Security.

Computer Security, DNS, DNS-over-TLS, Google, Internet, Public DNS, Security News, TLS,

8.8.8.8 – Google Public DNS now Support DNS-over-TLS to Protect Customer Search Queries

DNS-over-TLS

Google Public DNS (8.8.8.8) now officially supports DNS-over-TLS that provides complete privacy for users and their search queries between their devices and Google Public DNS. DNS allows to convert Internet domain names like www.gbhackers.com into IP addresses, in this case, un protect users queries exposed the sensitive information. New Implementation of DNS-over-TLS now supports Google […]

The post 8.8.8.8 – Google Public DNS now Support DNS-over-TLS to Protect Customer Search Queries appeared first on GBHackers On Security.

bathtub, Connected Devices, Internet, IoT, IoT Devices, Vulnerability,

30,000 Hot Bathtubs are vulnerable to Remote Attack by Hackers

bathtubs

Researchers discovered a serious flaw in more than 30,000 IoT connected bathtubs that can be authenticated by remote attackers to control the vulnerable tub located in your home. Ceri Coburn , a company that offers a mobile app as a Water App that controlling more than 30,000 hot tubs. The App allows the user to […]

The post 30,000 Hot Bathtubs are vulnerable to Remote Attack by Hackers appeared first on GBHackers On Security.

Active Directory, AD, Checklist, Computer Security, Internet, Penetration Testing, Security Tools,

Active Directory Penetration Testing Checklist

Active Directory

Active directory penetration testing this article can be helpful for penetration testers and security experts who want to secure their network. “Active Directory” Calles as “AD” is a directory service that Microsoft developed for the windows domain network. using it you can to control domain computers and services that are running on every node of […]

The post Active Directory Penetration Testing Checklist appeared first on GBHackers On Security.

Botnet, Computer Security, Hacks, Internet, password cracking, Security Hacker, Security News, unCaptcha2,

unCaptcha2 Bypassed Google ReCaptcha with 91% Accuracy

unCaptcha2

Researchers from the University of Maryland recently break the Google’s ReCaptcha audio challenge system using new unCaptcha2 with 91% of accuracy. ReCaptcha is one the most popular system that protects website from bots and challenge that provides “I am not a robot” popups to make sure the website accessing by a real human. This is […]

The post unCaptcha2 Bypassed Google ReCaptcha with 91% Accuracy appeared first on GBHackers On Security.

Anonymus, Darknet, Infosec- Resources, Internet, TOR, VPN,

TOR and VPN Anonymous Enough for Dark Web

TOR and VPN

Dark web is the World Wide Web content that exists on darknets, overlay systems which use public Internet yet we must particular software, configuration or approval to use. Let’s see TOR and VPN Anonymous enough for Dark Web. You can also take the Secrets of Dark Web – How to Access Dark Web Safely Online course […]

The post TOR and VPN Anonymous Enough for Dark Web appeared first on GBHackers On Security.

Authentication, Computer Security, Cyber Attack, Internet, Malware, Protect, Security Hacker, TYPE C, usb, USB-IF,

USB-IF Launches USB Type-C Authentication Program To Protect Against From Malicious Devices

USB Type-C

USB-IF announced USB Type-C Authentication Program to confirm the authencity of the USB device USB device, USB cable or USB charger. The Authentication program is the milestone for USB security protocol. The authentication program protect against non-compliant USB chargers and to mitigate risks from malicious firmware/hardware in USB devices attempting to exploit a USB connection. […]

The post USB-IF Launches USB Type-C Authentication Program To Protect Against From Malicious Devices appeared first on GBHackers On Security.