Category: GBHackers – Latest Cyber Security News | Hacker News

Tor Project Creates New Privacy-Focused Browser using VPN Layer

The Tor browser guarantees that your communication remains operational through a decentralized network of transfers maintained by volunteers located worldwide. It safeguards your internet connection from prying eyes by preventing any individual from monitoring the websites you visit, shields your…

Spyware Vendors Exploit 0-Days On Android and iOS Devices

The Threat Analysis Group (TAG) of Google unveiled recently that commercial spyware vendors targeted Android and iOS devices using zero-day vulnerabilities patched last year. In November 2022, the first campaign was discovered by security analysts targeting iOS and Android users.…

New WiFi Flaw Let Attackers Hijack Network Traffic

A fundamental security issue in the design of the IEEE 802.11 WiFi protocol standard, according to a technical study written by Domien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef of imec-DistriNet, KU Leuven, allows attackers to deceive access points into exposing…

UK Police Setup Thousands of  Fake DDoS-For-Hire Websites

The National Crime Agency (NCA) of the United Kingdom revealed that it had built several fake DDoS-for-hire service websites to track down cybercriminals who use these platforms to attack businesses. Also, this declaration follows the Agency’s decision to designate one of…

Parts of Twitter’s Source Code Leaked Online On GitHub

Recently, Twitter has acknowledged that some of its confidential source code has been exposed on the popular coding platform GitHub. To address this issue, Twitter has sent GitHub a copyright infringement notice. The petition demands GitHub identify the individual who…

Hackers Inject Weaponized JavaScript (JS) on 51,000 Websites

Researchers from Unit 42 have been monitoring a widespread campaign of harmful JavaScript (JS) injections. The campaign aims to redirect unsuspecting victims to dangerous content, including adware and fraudulent pages. Websites continue to be infected by this threat in 2023,…

Malicious ChatGPT Chrome Extension Steal Facebook Accounts

Thousands of Facebook accounts have been stolen due to a trojanized version of the legitimate ChatGPT extension for Google Chrome. The trojanized version of the ChatGPT extension managed to gain popularity with more than 9,000 downloads. Cybercriminals replicated the genuine…

Google to Reduce SSL Certificate Lifespan to 90 Days

Recently, Google declared its plan to reduce the maximum validity for public TLS (SSL) certificates from 398 to 90 days. Under its “Moving Forward, Together” plan, Google intended to limit the maximum public TLS certificate validity to 90 days via…

BFSI Sector at the Forefront of Cyberattacks

In recent years, the BFSI Sector (Banking, Financial Services, and Insurance) has become a primary target for cyber attackers. A 2022 report by IBM revealed that the average cost of a data breach in the financial industry reached a staggering…

OpenAI Announces GPT-4, the Successor of ChatGPT

A powerful new AI model called GPT-4 has been released recently by OpenAI, which is capable of comprehending images and texts. The company describes this as the next-stage milestone in its effort to scale up deep learning. In November 2022,…

Data Security With Cloud Compliance: Meeting Regulations & Standards

Businesses from all industries are aware of the benefits of cloud computing. Some organizations are just getting started with migration as part of digital transformation initiatives, while others are implementing sophisticated multi-cloud, hybrid strategies. However, data security in cloud computing…

AT&T Vendor Hacked – Over 9 Million Customers Data Exposed

The “Customer Proprietary Network Information (CPNI)” from some wireless accounts was accessed by an unauthorized person, according to AT&T, who discovered the breach in a vendor’s system. Over 9 million AT&T customers were informed that some of their information had…

U.S. House and Senate members Data Hacked, Offered for Sale

The breach of a Washington, DC, health insurance marketplace may have allowed hackers’ access to members of the House and Senate’s sensitive personal information, it was revealed on Wednesday. The lawmakers’ staff members and their families also suffered. DC Health…

Hackers Using Facebook Ads to Attack Critical Infrastructure Employees

A new information stealer has been recently found by cybersecurity researchers at Morphisec which is called “SYS01stealer.” This stealer primarily targets entities from the following critical infrastructures:- The Morphisec intelligence team has been tracking this advanced information stealer since November…

PoC Exploit Released For Critical Microsoft Word RCE Bug

There has been a proof-of-concept published recently for CVE-2023-21716 that analyzes this vulnerability. This vulnerability has been marked as “Critical” and has been detected in Microsoft Word which permits remote code execution (RCE). Microsoft’s latest Patch Tuesday release in February…

Wireshark 4.0.4 Released – What’s New!!

The latest release of Wireshark, version 4.0.4, has been launched by the Wireshark Team. This new version offers a host of improvements and updates that enhance protocol support, including several bug fixes. It can be used for a wide range…

Stanford University Data Breach – Ph.D. Admission Data Leaked

Stanford University has recently reported a security incident involving a data breach. The incident, which occurred between December 2022 and January 2023, involved the unauthorized download of files containing sensitive admission information for the Economics Ph.D. program from the university’s…

NSA Released Checklist To Secure Home Wi-Fi Network

Cybercriminals can breach the security of your home WiFi and potentially cause you significant harm. Your home network may be used by malicious cyber actors to access sensitive, private, and personal data. The National Security Agency published best practices for…

SN1PER – Most Advanced Automated Penetration Testing Tool – 2023

Sn1per is an automated scanner that can automate the process of collecting data for exploration and penetration testing. In their work sn1per involves such well-known tools like: amap, arachni, amap, cisco-torch, dnsenum, enum4linux, golismero, hydra, metasploit-framework, nbtscan, nmap smtp-user-enum, sqlmap,…

1000 Best Google Dorks List (Google Hacking Guide) – 2023

Google Dorks List “Google Hacking” is mainly referred to pulling sensitive information from Google using advanced search terms that help users to search the index of a specific website, specific file type and some interesting information from unsecured Websites. Google…

Active Directory Penetration Testing Checklist – 2023

This article covers Active directory penetration testing that can help for penetration testers and security experts who want to secure their network. “Active Directory Pentesting” Called as “AD penetration Testing” is a directory service that Microsoft developed for the Windows…

GoDaddy Hacked – Attacked Installed Malware on its Servers

GoDaddy found malicious malware had been installed on servers in its cPanel shared hosting environment by an unauthorized third party. This results in the websites of its clients being intermittently rerouted. “We investigated and found that the intermittent redirects were…

Google Launches Privacy Sandbox Beta for Android Users

Google has become an inevitable thing in our day-to-day life. Especially, mobile apps are being developed every day to make life better with technology. Now the company officially announced that they are rolling out Privacy Sandbox Beta for a few…

10 Best Linux Distributions In 2023

The Linux Distros is generally acknowledged as the third of the holy triplet of PC programs, simultaneously with Windows and macOS. Here we have provided you with a top 10 best Linux distros list 2023 for all professionals. Hence Linux…

10 Best Free SSL Checker Tools 2023

SSL Checker helps you in troubleshooting common SSL issues and SSL endpoint vulnerabilities. With the free SSL certificate checker tool, just you need to submit the domain name or IP address along with the port number to analyze the configuration…

10 Best Free SSL Checker Tools

SSL Checker helps you in troubleshooting common SSL issues and SSL endpoint vulnerabilities. With the free SSL certificate checker tool, just you need to submit the domain name or IP address along with the port number to analyze the configuration…

Record-Breaking DDoS Attack – Over 71 Million RPS

DDos is a malicious attempt to disturb the legitimate packets reaching the network equipment and services. When the DDoS attack is in place, organizations may experience an outage with one or more services, as the attacker looted their resources with…

Hyundai, Kia Flaw Lets Attackers Steal Car With a USB Cable

Car manufacturers Kia and Hyundai have recently taken measures to address concerns over vehicle security following the viral popularity of TikTok videos demonstrating how to easily steal their cars.  In response, the companies are now offering car owners the option…

How Log Monitoring Prevents Web Attacks?

Security logging and monitoring failures feature in the OWASP Top 10 list, moving up to #9 from #10 in the 2017 list. Why so? Because logging and monitoring failures hinder your effective threat detection. If the website risks are not…

Best SIEM Tools List For SOC Team – 2023

Every cybersecurity workflow starts from log data collection and management, that’s why we curated the Best SIEM Tools list that is highly demanded among enterprises that strive to maintain a stable security posture and comply with necessary regulations. This overview…

Google Launches Privacy Sandbox Beta for Android Users

Google has become an inevitable thing in our day-to-day life. Especially, mobile apps are being developed every day to make life better with technology. Now the company officially announced that they are rolling out Privacy Sandbox Beta for a few…

10 Best Linux Distributions In 2023

The Linux Distros is generally acknowledged as the third of the holy triplet of PC programs, simultaneously with Windows and macOS. Here we have provided you with a top 10 best Linux distros list 2023 for all professionals. Hence Linux…

Record-Breaking DDoS Attack – Over 71 Million RPS

DDos is a malicious attempt to disturb the legitimate packets reaching the network equipment and services. When the DDoS attack is in place, organizations may experience an outage with one or more services, as the attacker looted their resources with…

Namecheap Emails Hacked To Send Phishing Email

The email account of domain registrar Namecheap was compromised which led to a flood of DHL and MetaMask phishing emails that sought to steal the victims’ personal information and cryptocurrency wallets. Reports say the phishing attacks began at 4:30 PM…