Tag: Vulnerability

soc

Romania Under DDoS Attacks: Weekly DDoS Threat Intelligence Analysis

Romania Under DDoS Attacks: Weekly DDoS Threat Intelligence Analysis Analysis Period: March 17 – 23, 2026 Between March 17 and 23, 2026, SOCRadar identified an extensive coordinated DDoS campaign conducted by the pro-Russian threat actor NoName057(16) using their DDoSia attack tool. The campaign resulted in 13,716 recorded attack entries, targeting 148 unique domains and 134 […]

Mehr lesen →
soc

ClawHub Vulnerability Lets Attackers Manipulate Rankings to Become Top Skill

Silverfort researchers recently uncovered a critical security flaw in ClawHub, the main public registry for the OpenClaw agent ecosystem. This vulnerability allowed attackers to artificially boost download numbers, pushing malicious code to the top of the search results. This created a massive supply chain risk that could allow threat actors to run dangerous code on […]

The post ClawHub Vulnerability Lets Attackers Manipulate Rankings to Become Top Skill appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →
soc

HackerOne Confirms Employee Data Stolen Following Linked Navia Hack

HackerOne, a leading vulnerability coordination and bug bounty platform, has officially confirmed a data breach impacting its employees. The security incident did not occur directly on HackerOne’s internal network or infrastructure. Instead, the sensitive data was exposed through a targeted cyberattack on a third-party service provider known as Navia. Employee Data Stolen According to a […]

The post HackerOne Confirms Employee Data Stolen Following Linked Navia Hack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →
soc

Aqua Security’s Trivy Scanner Hit by Supply Chain Attack, Threatening Software Integrity

A sophisticated supply chain attack compromised Aqua Security’s popular open-source Trivy vulnerability scanner. Threat actors successfully distributed malicious code through the project’s GitHub Actions, targeting deployment pipelines to silently exfiltrate sensitive credentials. While Aqua’s commercial products remain completely unaffected, the incident highlights the severe risks of using mutable version tags in deployment automation. The attack […]

The post Aqua Security’s Trivy Scanner Hit by Supply Chain Attack, Threatening Software Integrity appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →
soc

CVE-2026-3055: NetScaler Memory Disclosure Puts SAML-Enabled Edge Devices at Risk

CVE-2026-3055: NetScaler Memory Disclosure Puts SAML-Enabled Edge Devices at Risk Citrix has released fixes for two NetScaler vulnerabilities that security teams should review right away: CVE-2026-3055 and CVE-2026-4368. The first is a critical memory overread issue while the second is a race condition that can cause user session mix-ups. Both matter because NetScaler ADC and […]

Mehr lesen →
soc

Dell Wyse Management Flaws Could Lead to Full System Compromise

Security researcher Aleksandr Zhurnakov from PT Security has discovered a critical exploit chain in Dell Wyse Management Suite. By combining seemingly minor logic flaws, an attacker can achieve unauthenticated remote code execution. This attack targets the On-Premises version of the software, impacting both Standard and Pro editions. Vulnerability Details The exploit relies on two newly […]

The post Dell Wyse Management Flaws Could Lead to Full System Compromise appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →
soc

Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution

TP-Link recently published a critical security advisory addressing four high-severity vulnerabilities in its Archer series routers. The flaws impact the Archer NX200, NX210, NX500, and NX600 models. If successfully exploited, these vulnerabilities enable threat actors to bypass authentication, execute unauthorised operating system commands, and manipulate sensitive device configuration files. Vulnerability Details The advisory highlights a […]

The post Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Mehr lesen →