Category: GBHackers – Latest Cyber Security News | Hacker News

Is this website Safe : How to Check Website Safety – 2023

is this website safe ? In this digital world, Check website safety is the most important concern since there are countless malicious websites available everywhere over the Internet, it is tough to find a trustworthy website. We need to browse smart and…

North Korean Hackers Targeting Healthcare to Fund for Malicious Activities

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has issued a new advisory regarding cybersecurity. This advisory details recent observations of TTPs used in North Korean ransomware operations.  These operations have targeted public health and other critical infrastructure sectors, highlighting…

Researcher Hacked Toyota’s Global Supplier Portal

The Global Supplier Preparation Information Management System, or GSPIMS, of Toyota, was breached by a security researcher using a backdoor. After 90 days, the hacker dutifully alerted the company about the breach. The firm’s web platform, known as GSPIMS, enables…

Hackers Breached Reddit – Stole Source Code & Internal Data

Reddit recently revealed that it was subjected to a security breach. Unidentified cybercriminals were able to gain unauthorized access to the company’s internal documents, source code, as well as some of its business systems. On the evening of February 5,…

Live Cyber Forensics Analysis with Computer Volatile Memory

The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form (that is, digital evidence). Forensics Analysis – Volatile Data: How to Collect Volatile Data: Acquisition of…

Hackers Actively Exploiting VMware ESXi Servers to Deploy Ransomware

CERT-FR, the French Computer Emergency Response Team (CERT-FR), as well as administrators and hosting providers, have issued a warning concerning new ransomware, called ESXiArgs, that has been discovered. This vulnerability makes it possible for the attackers to deploy the ESXiArgs…

Finland’s Most-Wanted Hacker Arrested in France

A 25-year-old Finnish man named Julius “Zeekill” Kivimäki was taken into custody this week in France. He is facing charges of extorting an online psychotherapy practice based in his local area and causing the confidential therapy notes of over 22,000…

How Application Mapping Can Boost Application Security

Application security refers to the measures taken to protect the confidentiality, integrity, and availability of an application and its associated data. This involves designing, developing, and deploying applications in a secure manner and protecting them against threats such as hacking,…

Tor and I2P Networks Suffered DDoS Attacks

Lately, a number of individuals have been encountering difficulties with the Tor network in terms of connectivity and performance. It’s not just you who is facing this issue, as others have reported slower loading or even complete failure to load…

Researcher Hacked Toyota’s Global Supplier Portal

The Global Supplier Preparation Information Management System, or GSPIMS, of Toyota, was breached by a security researcher using a backdoor. After 90 days, the hacker dutifully alerted the company about the breach. The firm’s web platform, known as GSPIMS, enables…

Exploit Released for GoAnywhere File Transfer Zero-Day Flaw

A zero-day vulnerability affecting on-premise instances of Fortra’s GoAnywhere MFT-managed file transfer solution was actively exploited, according to a warning posted on Mastodon by security researcher Brian Krebs. GoAnywhere is a safe web file transfer application that allows businesses to securely…

5 Best Technologies to Secure Kubernetes – 2023

Kubernetes security refers to the measures and practices used to protect a Kubernetes cluster and its resources, such as pods, services, and secrets, from unauthorized access and potential threats. This includes securing the communication between components, defining and enforcing access…

Hackers Actively Exploiting VMware ESXi Servers to Deploy Ransomware

CERT-FR, the French Computer Emergency Response Team (CERT-FR), as well as administrators and hosting providers, have issued a warning concerning new ransomware, called ESXiArgs, that has been discovered. This vulnerability makes it possible for the attackers to deploy the ESXiArgs…

75 Best Android Penetration Testing Tools – 2023

Android penetration testing tools are more often used by security industries to test the vulnerabilities in Android applications. Here you can find the Comprehensive mobile penetration testing tools and resource list that covers Performing Penetration testing Operations in Android Mobiles.…

Cloud Computing Penetration Testing Checklist – 2023

Cloud Computing Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code. Cloud computing is the shared responsibility of the Cloud provider and the client who earn the service…

50 Best Free Cyber Threat Intelligence Tools – 2023

Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and applications. It helps with the collection and analysis of information about current and potential attacks that threaten the safety of an organization or…

Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

Cyble Research and Intelligence Labs (CRIL) is a security research organization that has been monitoring the actions of a group of cyber criminals called “InTheBox”.  This group is primarily active on a Russian-language cybercrime forum, where they engage in illegal…

GitHub Breach – Hackers Stole Code Signing Certificates From Repositories

GitHub announced that it suffered a security breach in which unauthorized individuals obtained access to specific development and release planning repositories and stole encrypted code-signing certificates for the Desktop and Atom applications. Hence, in order to avoid any potential misunderstandings,…

Most Important Computer Forensics Tools for 2023

Computer Forensics tools are more often used by security industries to test the vulnerabilities in networks and applications by collecting the evidence to find an indicator of compromise and take appropriate mitigation Steps. Here you can find the Comprehensive Computer…

New DDoS-as-a-Service Platform Attacking Medical Institutions

Passion Group, a Killnet, and Anonymous Russia affiliate, recently started providing DDoS-as-a-Service to pro-Russian hackers.  During the attacks on January 27, the Passion Botnet was used to target medical institutions in the United States, Portugal, Spain, Germany, Poland, Finland, Norway, the…

Facebook & Instagram Flaw Let Anyone Bypass Two-factor Authentication

The lack of rate-limiting in Instagram was discovered by Gtm Mänôz, a security researcher from Kathmandu, Nepal.  This flaw could have allowed an attacker to bypass Facebook’s two-factor authentication by validating the targeted user’s already-validated Facebook mobile number using the…

Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

Cyble Research and Intelligence Labs (CRIL) is a security research organization that has been monitoring the actions of a group of cyber criminals called “InTheBox”.  This group is primarily active on a Russian-language cybercrime forum, where they engage in illegal…

GitHub Breach – Hackers Stole Code Signing Certificates From Repositories

GitHub announced that it suffered a security breach in which unauthorized individuals obtained access to specific development and release planning repositories and stole encrypted code-signing certificates for the Desktop and Atom applications. Hence, in order to avoid any potential misunderstandings,…

Facebook & Instagram Flaw Let Anyone Bypass Two-factor Authentication

The lack of rate-limiting in Instagram was discovered by Gtm Mänôz, a security researcher from Kathmandu, Nepal.  This flaw could have allowed an attacker to bypass Facebook’s two-factor authentication by validating the targeted user’s already-validated Facebook mobile number using the…

Hackers Exploiting Unpatched Exchange Servers in The Wild

Microsoft has been strongly encouraging its customers to keep updating their Exchange servers, in addition to taking steps to ensure that the environment remains secured with robust security implementations. While doing so, users can do the following things:- The number…

Wireshark 4.0.3 Released – What’s New!

The Wireshark Team has recently unveiled the latest iteration of their widely-utilized packet analyzer, Wireshark 4.0.3.  This version boasts a multitude of improvements, including new features and updates, as well as the resolution of various bugs to ensure a smooth…

Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

A joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) has been released to alert network defenders to malicious use of legitimate remote monitoring and management (RMM)…

Top FinTech API Security Challenges

A recent report reveals that the number of attacks on financial service APIs and web applications worldwide increased by 257%.   There are more APIs in use than ever, and the average FinTech company takes advantage of hundreds if not thousands of connections…

Wireshark 4.0.3 Released – What’s New!

The Wireshark Team has recently unveiled the latest iteration of their widely-utilized packet analyzer, Wireshark 4.0.3.  This version boasts a multitude of improvements, including new features and updates, as well as the resolution of various bugs to ensure a smooth…

ChatGPT Can Be Used to Create Dangerous Polymorphic Malware

The cybersecurity experts at CyberArk have provided information on the mechanism by which the ChatGPT AI chatbot can produce a new strain of polymorphic malware. Polymorphic malware could be easily made using ChatGPT. With relatively little effort or expenditure on…

10 Best Free Firewall Software – 2023

In this article, we have done a depth analysis and listed your top 10 best Free Firewall software that provided extended security to protect your system from bad actors. Generally, every computer is connected to the internet and is susceptible…

Cisco Unified CM SQL Injection Flaw Let Attackers Execute Crafted SQL Queries

Cisco released fixes for Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition to address high-severity SQL injection vulnerability. “An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL…

Hackers Actively Exploiting Critical ManageEngine Vulnerability

Rapid7 is taking action in response to several instances of compromise caused by the exploitation of CVE-2022-47966, which is a pre-authentication remote code execution (RCE) vulnerability.  This vulnerability affects nearly 24 on-premise ManageEngine products, and it is a serious threat…

T-Mobile Hacked – Over 37 Million Customer Data Exposed

T-Mobile US, Inc. discovered that a malicious attacker was illegally accessing data through a single Application Programming Interface (“API”). The research revealed that the threat actors accessed information for about 37 million active postpaid and prepaid customer accounts using this API,…

Hackers Abuse GitHub Codespaces Feature to Host and Deliver Malware

Trend Micro researchers have recently demonstrated that malware and malicious scripts can be hosted and distributed within GitHub Codespaces by malicious actors through the use of port forwarding functionality. GitHub Codespaces allows developers to quickly set up a workspace and…

GitLab Critical Security Flaw Let Attacker Execute Arbitrary Code

GitLab has released fixes for two security flaws in Git that are of critical severity and might allow attackers to remotely execute arbitrary code and take advantage of integer overflows. The flaws, identified as CVE-2022-41903 and CVE-2022-23521, were patched in…

Wireless Penetration Testing Checklist – A Detailed Cheat Sheet

Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses the Weakness, technical flows, and Critical wireless Vulnerabilities. The most important countermeasures we should focus on are Threat  Assessment, Data…

Most Important Network Penetration Testing Checklist

Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall…

Protecting Your Cloud Environments With Zero Trust

When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the cloud from the inside out using the principle of least privilege to grant secure access to any company resource. Eliminating…

Hackers Selling Telegram Insider Server Access on Dark Web Forums

SafetyDetectives’ cybersecurity researchers came across a dark web marketplace that claims to provide consumers with access to Telegram’s internal server for the price of $20,000. The seller claims that the price is non-negotiable and includes uninterrupted access to Telegram servers through…

Hackers Use Text-to-SQL Attacks to Break into Your Databases

Recently, a group of researchers successfully demonstrated a new type of attack that utilizes Text-to-SQL models in order to generate malicious code. The most astonishing thing about this malicious code is, it’s enough potential to obtain sensitive information and launch…

Top 10 Best Penetration Testing Companies & Services – 2023

Penetration Testing Companies are pillars when it comes to information security, nothing is more important than ensuring your systems and data are safe from unauthorized access, Many organizations have a flawed security culture, with employees motivated to protect their own…

Can Open Source Security Prevent Zero-Day Attacks?

A zero-day (or zero-day) vulnerability is a software security risk that is not known to the software vendor or user. A zero-day attack is an attempt by an attacker to gain access to a vulnerable system. This is a serious…

Triple Extortion Ransomware: How to Protect Your Organization?

Ransomware strikes businesses every 11 seconds. The ransomware attack volume is already at record levels, but we’re hearing it’s only getting worse.   As some victims managed to take precautions and refused to pay the ransom, attackers began to add more…