security

📅 Kalender

< March 2026 >
Mo
Di
Mi
Do
Fr
Sa
So
1
2
3
4
5
6
7
8
9
1011
12
13
14
15
16
17181920212223242526
27
28
29
30
31
soc

Mirai Botnets Evolve Into Major DDoS and Proxy Abuse Threats

Mirai-based botnets have evolved from simple IoT malware into large-scale DDoS and proxy abuse platforms that now underpin record-breaking attacks and stealthy cybercrime operations. In total, over 21,000 C2 servers were observed between July and December 2025, with a notable shift towards abusing bots as residential proxies in addition to classic DDoS use. This growth […]

The post Mirai Botnets Evolve Into Major DDoS and Proxy Abuse Threats appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →
soc

GoHarbor Issues Urgent Patch for Harbor Flaw Allowing Full Registry Compromise

A critical security flaw in GoHarbor’s Harbor container registry exposes organizations to severe supply chain attacks. Tracked as CVE-2026-4404, this vulnerability stems from hardcoded default credentials that remain active unless manually altered by an administrator. Harbor functions as an open-source, OCI-compliant registry project designed to store, sign, and manage container images. Because it plays a […]

The post GoHarbor Issues Urgent Patch for Harbor Flaw Allowing Full Registry Compromise appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →
security

Acht Tage ohne Unterbrechung – DDoS wird zur Dauerbelastung

Acht Tage lang bombardierten DDoS-Angreifer 2025 ein Ziel ohne Pause, der längste Angriff, den Link11 jemals dokumentierte. Im selben Jahr standen an 88 Prozent der Tage Unternehmen durch DDoS-Angriffe unter Beschuss. Was früher die Ausnahme war, ist heute der Regelbetrieb: Terabit-Attacken über Tage hinweg zwingen zum Umdenken in der DDoS-Abwehr.

Mehr lesen →
soc

CISA Adds One Known Exploited Vulnerability to Catalog

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria

Mehr lesen →
soc

Mozilla Releases Firefox 149.0 With Free Built‑In VPN Offering 50 GB Monthly Data

Mozilla released Firefox 149.0 to the Release channel, bringing a significant set of privacy and security enhancements to the browser. The standout feature of this update is the integration of a free, built-in VPN designed to protect users on public networks and secure sensitive browsing activities. The new built-in VPN routes web traffic through a […]

The post Mozilla Releases Firefox 149.0 With Free Built‑In VPN Offering 50 GB Monthly Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →