There has been a new eavesdropping attack developed by a team of security experts for Android devices which has been dubbed “EarSpy.” With the help of this attack, attackers can detect the following things:- As part of its exploratory purpose,…
Category: GBHackers – Latest Cyber Security News | Hacker News
GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection
An advanced malware downloader named GuLoader has recently been exposed by cybersecurity researchers at CrowdStrike. This advanced downloader has the capability to evade the detection of security software by adopting a variety of techniques. While analyzing the shellcode of GuLoader,…
Most Important Android Penetration Testing Tools for Pentesters 2023
Android security testing is more often used by security industries to test the vulnerabilities in Android applications. Here you can find the Comprehensive Android Penetration testing tools and resource list that covers Performing Penetration testing Operation in Android Mobiles. Online…
Hackers Deploy New Information Stealer Malware onto Python Developers’ Machines
Researchers at Phylum recently discovered that hackers had been injecting information stealer malware into Python developers’ machines in order to steal their information. As they dug deeper, they discovered a new stealer variant with many different names. While apart from…
Critical Linux Kernel Vulnerability Let Attackers Execute Arbitrary Code Remotely
SMB servers that have ksmbd enabled are vulnerable to hacking due to a major Linux kernel vulnerability (CVSS score of 10). KSMBD is a Linux kernel server that uses the SMB3 protocol to share files over the network in kernel…
Critical Linux Kernel Vulnerability Let Attackers Execute Remote Code
SMB servers that have ksmbd enabled are vulnerable to hacking due to a major Linux kernel vulnerability (CVSS score of 10). KSMBD is a Linux kernel server that uses the SMB3 protocol to share files over the network in kernel…
Hackers Using Automated Attack to Exploit Exchange Server and SQL Injection Vulnerabilities
Recently, cybersecurity analysts at Prodraft’s threat intelligence team detected that the hacker group FIN7 was actively exploiting vulnerabilities in Microsoft Exchange and SQL injection through an automated attack system in an attempt to perform the following illicit activities:- For years…
Wireless Network Penetration Testing Checklist – A Detailed Cheat Sheet
Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses the Weakness, technical flows, and Critical wireless Vulnerabilities. Most important countermeasures we should focus on are Threat Assessment, Data theft…
Top 10 Best Linux Distributions In 2023
The Linux Distros is generally acknowledged as the third of the holy triplet of PC programs, simultaneously with Windows and macOS. Here we have provided you with a top 10 best Linux distros list 2023 for all professionals. Hence Linux…
KmsdBot Botnet Leverages SSH to Compromise Systems and to Launch DDoS Attacks
Researchers from Akamai have continued to study the cryptomining botnet KmsdBot and have looked at its attack flow. It is believed that KmsdBot is a distributed denial of service (DDoS) for hire due to the wide range of companies and…
OWASSRF – New Exploit Let Attacker Execute Remote Code on Microsoft Exchange Server
There is a new exploit chain dubbed, OWASSRF that threat actors are actively exploiting to gain arbitrary code execution through Outlook Web Access (OWA) on vulnerable servers that bypasses ProxyNotShell URL rewrite mitigations. A recent investigation by CrowdStrike Services found…
Windows Code-Execution Vulnerability Let Attackers Run Malicious Code Without Authentication
It has recently been discovered by researchers that Windows has a vulnerability that allows code execution that rivals EternalBlue in terms of potential. It is possible for an attacker to execute malicious code without authentication by exploiting this newly-tracked vulnerability…
Hackers Use New BrasDex Android Malware to Steal Users’ Banking Details
A new Android trojan called BrasDex has been identified as the work of the same threat actors responsible for the Casbaneiro malware that targets Windows banking systems. The security analysts at ThreatFabric recently spotted an ongoing multi-platform campaign in which…
Google’s New End-To-End Encryption for Gmail on the Web
On Friday, Google released a beta version of Client-side encryption (CSE) for Gmail. This newest service is only useful to organisations that can produce their own decryption keys because CSE is designed for organisational use. Google has now made “end-to-end…
My Identity was Stolen! Here’s How You Might Become a Target
Impersonating someone is an activity as old as mankind and has been performed to a great comedic effect by comedians and clowns throughout the ages. Unfortunately, identity theft is not a laughing matter, as it could potentially have devastating effects…
Microsoft Discovered a Vulnerability in macOS That Allow Attackers to Install Malware
The macOS operating system was fixed recently by Apple to eliminate a vulnerability found and reported by the principal security researcher of Microsoft, it could be exploited by attackers to install malware. Untrusted applications with the capability of bypassing Gatekeeper…
Beware of Highly Sophisticated DarkTortilla Malware Distributed Via Phishing Sites
Cyble Research and Intelligence Labs (CRIL) detected threat Actors (TAs) distributing the malware DarkTortilla. Since 2015, the complex .NET-based malware known as DarkTortilla has been operating. Researchers say that numerous stealers and Remote Access Trojans (RATs) including AgentTesla, AsyncRAT, NanoCore, etc.…
Top 10 Best Malware Removal Tool 2023
Malware removal tool helps to remove the dangerous malware from your personal computer to protect from hackers and prevent future attacks. Today the most essential thing is to have security on your PC or laptop, as you never know when…
Is this website Safe : How to Check Website Safety to Avoid Cyber Threats Online
is this website safe ? In this digital world, Check website safety is most important concern since there are countless malicious websites available everywhere over the Internet, it is very difficult to find a trustworthy website. We need to browse smart and…
Hackers Use Trojanized Windows 10 Installer To Attack Against Government Entities
Mandiant recently identified that in a targeted attack on Ukrainian government entities, trojanized ISO files were used by threat actors to cloak malicious programs posing as legitimate Windows 10 installers for the first step in compromising their networks. Malicious installers…
Over 9 Million Credit Card Data Exposed from Leading Payment Systems
An open and unprotected database with 9,098,506 records of credit card transactions was discovered recently by security researcher Jeremiah Fowler and the Website Planet research team. There were a number of essential pieces of information like Personally Identifiable Information (PII)…
Facebook Infrastructure Used by Hackers in Phishing Attack Chain
A Meta-Phish attack that could lead to the loss of personally identifiable information (PII), login information, and a Facebook profile link was discovered by Trustwave SpiderLabs. This recent phishing campaign tricks victims by using Facebook posts in its chain of…
FBI Seized 48 Domains Linked to World’s Leading DDoS-for-Hire Services
In an attempt to reduce the entry barrier for malicious activity, the U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 48 domains that provided services to carry out distributed denial-of-service (DDoS) assaults on behalf of other threat…
Beware of WhatsApp Messages Offering Free Data to Watch FIFA World Cup
In Qatar, the 22nd FIFA World Cup began on November 20, 2022. This event sparked a new wave of cyberattacks. Threat actors targeted unsuspecting individuals with malicious activities that included the FIFA World Cup as a theme. The popularity of…
Hackers Use SVG Images to Install QBot Malware on Windows Systems
To perform HTML smuggling, the QBot malware phishing campaigns utilize SVG image files as a method of distribution. This method creates a malicious installer for Windows that can be run by the user locally. A Base64 encoded QBot malware installer…
Hackers Use SVG Images to Install QBot Malware onto Windows Systems
To perform HTML smuggling, the QBot malware phishing campaigns utilize SVG image files as a method of distribution. This method creates a malicious installer for Windows that can be run by the user locally. A Base64 encoded QBot malware installer…
FortiOS SSL-VPN Bug Let Attackers Execute Arbitrary Code Remotely
A critical vulnerability in FortiOS SSL-VPN let attackers perform unauthenticated arbitrary code execution remotely, and this flaw has been tracked as CVE-2022-42475. This vulnerability resides in FortiOS sslvpnd and it could potentially be exploited by unauthenticated attackers to perform code…
Uber Hacked Again – Data From Uber and Uber Eats Published on Hacking Forums
It has been reported that Uber has experienced yet another data breach following a cyberattack that compromised information including:- There has been increasing evidence that UberLeaks, a threat actor claiming to have stolen data from the following two services, has…
Hackers Deploy New Python Malware on VMware ESXi Server to gain Remote Access
A backdoor was found on a VMware ESXi virtualization server by Juniper Threat Labs. Reports say two vulnerabilities in the ESXi’s OpenSLP service, CVE-2019-5544 and CVE-2020-3992 have been the target of active in-the-wild attacks since 2019 on unpatched ESXi servers.…
StormWall’s New Point of Presence in Singapore Brings DDoS Protection to APAC
StormWall, a cybersecurity service that specializes in providing DDoS protection for IT infrastructures of all sizes and complexity, including websites, networks, and online services, today announced the opening of its sixth point of presence in Singapore, in partnership with IDCloudHost.…
Multiple Zero-Day Vulnerabilities in Antivirus and Endpoint Let Attackers Install Data Wipers
Or Yair of SafeBreach Labs recently discovered multiple security Zero-Day vulnerabilities that could be exploited by the threat actors to create next-generation wipers by converting the endpoint detection & response and antivirus products. At the BlackHat Europe cybersecurity conference, the…
Beware of WhatsApp Messages Offering Free Data to Watch FIFA World Cup
In Qatar, the 22nd FIFA World Cup began on November 20, 2022. This event sparked a new wave of cyberattacks. Threat actors targeted unsuspecting individuals with malicious activities that included the FIFA World Cup as a theme. The popularity of…
New Technique Discovered To Bypass Web Application Firewalls (WAF) Of Several Vendors
Experts from Industrial and IoT cybersecurity company Claroty developed a generic method for bypassing the web application firewalls (WAF) of a variety of leading manufacturers. Following a study of the wireless device management platform from Cambium Networks, Claroty’s researchers identified the technique.…
Cisco IP Phone Vulnerability Let Unauthenticated Attacker Execute Remote Code
Cisco has uncovered a high-severity vulnerability affecting its IP Phone 7800 and 8800 Series, tracked as CVE-2022-20968 (except Cisco Wireless IP Phone 8821). An unauthenticated, adjacent attacker might exploit the flaw to cause a stack overflow on an affected device,…
COVID-bit – A New Secret Channel to Spy Data Over the Air from Air-gapped Systems
Researchers uncovered a new covert channel to steal sensitive information from Air-gapped systems over the air from a distance of 2m. The ‘air-gap’ computers are physically isolated from a network or device from external networks such as the Internet. The…
North Korean APT37 Hackers Exploited IE Zero-Day Vulnerability Remotely
Researchers from the Google Threat Analysis group uncovered an incident associated with the north Korean APT37 hackers group that they have exploited an Internet Explorer Zero-day vulnerability. Threat actors attempted to exploit the vulnerability using a weaponized document that was…
Vice Society Ransomware Gang Attack Schools with Multiple Ransomware Families
According to a joint Cybersecurity Advisory (CSA) from the FBI, CISA, and MS-ISAC published in September 2022, Vice Society actors have recently been primarily targeting the education sector with ransomware assaults. As the 2022–23 school gets started and malicious ransomware…
Secure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDR
Security information and event management, or SIEM, was introduced some 17 years ago. It makes sense for a next-gen SIEM to emerge now, or it may already be long overdue. There is a need for a more powerful upgrade to…
Kali Linux 2022.4 Released – What’s New!!
Offensive Security released a new version of its Penetration testing distro Kali Linux 2022.4, with several new features, hacking Tools, Kali NetHunter pro versions, and desktop updates. Each year, Kali Linux versions have been regularly released with new features by the offensive…
CryWiper Malware Masquerades as Ransomware & Purposely Destroys Data
CryWiper, a previously unknown data wiper that masquerades as ransomware, has been recently discovered and is spreading around the internet. Furthermore, this ransomware completely destroys the data it infects instead of encrypting it. While during an attack against the Russian…
CryWiper Malware Masquerades as Ransomware & Destroys Data Purposefully
CryWiper, a previously unknown data wiper that masquerades as ransomware, has been recently discovered and is spreading around the internet. Furthermore, this ransomware completely destroys the data it infects instead of encrypting it. While during an attack against the Russian…
RDP Servers Hacked To Deploy Ransomware and Steal Sensitive Data
Research carried out by security analysts at CRIL (Cyble Research and Intelligence Labs) recently identified several ransomware groups that are actively targeting open RDP ports in an attempt to deploy ransomware. There could be major security issues that could occur…
Securing Kubernetes Deployments on AWS – Guide
Kubernetes Deployment on AWS Kubernetes is open-source software for deploying and managing containerized applications at scale. Kubernetes can manage clusters on Amazon EC2 instances, run containers on those instances, and perform deployment, maintenance, and scaling processes. Kubernetes lets you run…
Bug in Toyota, Honda, and Nissan Car App Let Hackers Unlock & Start The Car Remotely
The majority of major automobile manufacturers have addressed vulnerability issues that would have given hackers access to their vehicles to perform the following activities remotely:- Flaw in SiriusXM SiriusXM, one of the most widely used connected vehicle platforms available on…
Android Malware on Google Play with 2 Million Installs Steal Sensitive Data
More than two million Android users have been tricked into installing a set of malicious, phishing, and advertising apps via the Google Play store. Dr. Web antivirus discovered that these apps were disguised as essential utilities and system optimizer tools.…
A New Linux Flaw Lets Attackers Gain Full Root Privilege
The Threat Research Unit at Qualys’ has revealed how a new Linux flaw tracked as (CVE-2022-3328), may be combined with two other, seemingly insignificant flaws to gain full root rights on a compromised system. The Linux snap-confine function, a SUID-root…
New Android Malware Stolen Facebook Credentials From 300,000 Victims
The mobile security firm Zimperium has recently issued a warning about a Trojan called “Schoolyard Bully,” which is actively masquerading as an educational application in a malicious threat campaign. While this trojan “Schoolyard Bully” has been active since 2018, and…
Google Chrome High-Severity Zero-Day Flaw Exploited in The Wild – Emergency Patch!!
In response to the active exploit of an open high-severity zero-day vulnerability (CVE-2022-4262) in the Chrome web browser, Google has released an emergency security patch to address the issue. Actively exploited Chrome zero-day vulnerability that allows attackers to execute an…
How Visibility on Software Supply Chain Can Reduce Cyberattacks
With cyberattacks cropping up in several tech sectors today, there is rightly more focus on monitoring software supply chains in the SDLC than ever before. When SolarWinds was hacked in 2020, the event sent shockwaves across the software industry. Although…
‘Black Panthers’ – A SIM Swap Gang Connected With Dark Web Got Arrested
Spanish National Police arrested the notorious SIM-swapping gang operating under the name “Black Panthers” for various cyber crimes. The law enforcement agents arrested 55 people, including the leader heading this Black Panthers gang. The operators behind this Black Panthers committed the bank…
Beware that Hackers Using Malicious USB Devices to Deliver Multiple Malware
Recently, Mandiant Managed Defense discovered cyber espionage activity that focuses on the Philippines and mainly uses USB drives as an initial infection vector. This operation, which Mandiant tracks as ‘UNC4191’, has a connection to China. The report states that operations of…
Accidental Syntax Error Leads to Kill The Cryptomining botnet Malware “KmsdBot”
It turns out that Akamai’s team of researchers accidentally killed a newly discovered cryptocurrency mining botnet known as KmsdBot during the investigation. Due to a syntax error, the botnet was unable to send commands any longer, and as a result,…
Google Found a Framework Used to Exploit Zero-Days in Chrome, Firefox, & Windows
A trio of newly discovered exploit frameworks has been detailed by Google’s Threat Analysis Group (TAG) in a recent publication. In the last few years, these exploit frameworks have been exploited as zero-day vulnerabilities by exploiting: There were three separate…
Top 6 Best IP Geolocation APIs For Cybersecurity – 2023
IP geolocation services are capable of far more than serving website visitors in their local language and currency using IP lookup. They can also play a critical role in cybersecurity. Geolocation data can source the IP address of DDoS (Distributed…
Google Uncovers the Framework Used to Exploit Zero-Days in Chrome, Firefox, & Windows
A trio of newly discovered exploit frameworks has been detailed by Google’s Threat Analysis Group (TAG) in a recent publication. In the last few years, these exploit frameworks have been exploited as zero-day vulnerabilities by exploiting: There were three separate…
LastPass Hacked – Attackers Breached Cloud Storage & Access Customer Data
Using data from the August 2022 incident, LastPass experienced a breach of user information within a third-party cloud storage service. LastPass is a freemium Android password manager that simply collects encrypted passwords online, and LogMeIn, Inc. obtained the LastPass in…
RCE Bug in Android Remote Keyboard Apps With 2M Downloads Let Hackers Access keystrokes
Multiple critical vulnerabilities were found by the security researchers at Synopsys in three Android apps that enable users to control computer systems with Android devices. Furthermore, these critical vulnerabilities could be exploited by threat actors to expose key presses and…
10 Best Vulnerability Scanning Tools For Penetration Testing – 2023
A Vulnerability Scanning Tool is one of the essential tools in IT departments Since vulnerabilities pop up every day and thus leaving a loophole for the organization. The Vulnerability scanning tools help in detecting security loopholes in the application, operating…
TikTok’s ‘Invisible Challenge’ Abused by Hackers To Install Dangerous Malware
Cybersecurity analysts at Checkmarx affirmed that a popular TikTok challenge is being used by hackers to trick people into downloading malicious software that steals private information from them. Currently, the #invisiblefilter tag of this challenge has accumulated over 25 million…
Dell, HP, & Lenovo System Found Using Outdated OpenSSL Cryptographic Library
The cybersecurity researchers at Binarly recently discovered that outdated versions of the OpenSSL cryptographic library are still being used by the following companies on their devices:- OpenSSL cryptographic library versions that are outdated provide a risk to the supply chain…
Chrome Zero-Day Bug Actively Exploited in the Wild – Google Emergency Update!
The eighth zero-day vulnerability used in attacks this year has been fixed by Google in an emergency security upgrade for the desktop version of the Chrome web browser. This high-severity zero-day vulnerability is tracked as CVE-2022-4135, a Heap buffer overflow…
Chrome Zero Day Bug Actively Exploited in the Wild – Google Emergency Update!
The eighth zero-day vulnerability used in attacks this year has been fixed by Google in an emergency security upgrade for the desktop version of the Chrome web browser. This high-severity zero-day vulnerability is tracked as CVE-2022-4135, a Heap buffer overflow…
Operation HAECHI III – INTERPOL Arrested 1000 Cyber Criminals & Seized $130 Million
Recently, there have been almost 1000 arrests made as a result of a police operation conducted by INTERPOL in an attempt to combat online fraud. As a result of this operation, Interpol recovered virtual assets worth USD 129,975,440. Between June…
Hackers Rewritten The RansomExx Ransomware in Rust Language To Evade Detection
There has recently been a discovery made by IBM Security X-Force Threat Researchers regarding a new variant of ransomware known as RansomExx that is dubbed RansomExx2 which was written in Rust language. While threat actor behind this malware is known…
Web Application Penetration Testing Checklist – A Detailed Cheat Sheet
Web Application Pentesting is a method of identifying, analyzing and Report the vulnerabilities which are existing in the Web application including buffer overflow, input validation, code Execution, Bypass Authentication, SQL Injection, CSRF, Cross-site scripting in the target web Application which…
Chrome Extension Deploy Windows Malware to Steal Cryptocurrency and Clipboard Contents
In order to steal cryptocurrency and clipboard contents, ViperSoftX was detected by the security analysts at Avast, a Windows malware that is using a Google Chrome extension called VenomSoftX. A JavaScript-based RAT and crypto-hijacker are hidden within this Chrome extension…
Google Released Over 165 YARA Rules to Detect Cobalt Strike Components in Their Networks
There is a collection of IOCs from VirusTotal and YARA Rules that has been recently open-sourced by the Google Cloud Threat Intelligence team. As a result, Google has taken this step to make it easier for security researchers to catch…
Hackers Use New Ransomware that Encrypts Files & Steals Tokens From Victim’s Machine
Security researchers at Cyble recently identified that the authors of ransomware now have access to a brand new malicious tool – AXLocker – which has the ability to encrypt and make the multitude of file types unusable. As one of…
Chinese Hackers Using 42,000 Phishing Domains To Drop Malware On Victims Systems
An extensive phishing campaign targeting businesses in numerous upright markets, including retail, was discovered by Cyjax recently in which the attackers exploited the reputation of renowned brands, and this includes the following business sectors:- Fangxiao is a group classified as…
High-Severity RCE Bug in F5 Products Let Attackers Hack the Complete Systems
Experts from Rapid7 observed a customized CentOS installation operating on F5 BIG-IP and BIG-IQ devices found to have various vulnerabilities. While the other flaws are security bypass methods that F5 does not consider vulnerabilities, two of the vulnerabilities have been…
Hundreds of Amazon RDS Instances Leaking User’s Personal Data
Recently, the Mitiga Research Team found that hundreds of databases each month were exposed, with significant Personally Identifiable Information (PII) leakage. An analysis found that the reputable Amazon Relational Database Service is leaking PII through exposed Relational Database Service (RDS)…
U.S. Federal Network Hacked – Iranian APT Hackers Compromised Domain Controller
Recently, the FBI and CISA published a joint advisory in which they disclosed an Iranian APT group compromised the Federal Civilian Executive Branch (FCEB) organization network Domain controller by exploiting the Log4Shell RCE flaw (CVE-2021-44228) to deploy XMRig crypto-mining malware…
Google to Pay $391M Fine for Android User Location Tracking Practices
To settle a privacy lawsuit brought by a group of attorneys general from 40 different U.S. states, Google has agreed to pay $391.5 million. Reports say U.S. Michigan will earn close to $12 million from the settlement, which is the…
KmsdBot – A Malware Written in Golang Infects Via SSH To Perform DDoS Attack
Recently, a new piece of evasive malware has been discovered that is able to gain entry into enterprise systems in order to mine cryptocurrency by exploiting a key internet-facing protocol. Researchers have discovered that the malware is capable of launching…
Massive Black Hat Malware Infect 2500 Websites By Injecting Malicious JavaScript
Recently, the cybersecurity researchers of Sucuri have found that threat actors are conducting a tremendous massive black hat search engine optimization (SEO) campaign. However, nearly 15,000 websites redirected visitors to participate in fake Q&A discussion forums in this campaign. Over…
High-Severity RCE Bug in F5 Products Let Attackers Hack the Complete Systems
Experts from Rapid7 observed a customized CentOS installation operating on F5 BIG-IP and BIG-IQ devices found to have various vulnerabilities. While the other flaws are security bypass methods that F5 does not consider vulnerabilities, two of the vulnerabilities have been…
Hundreds of Amazon RDS Instances Leaking User’s Personal Data
Recently, the Mitiga Research Team found that hundreds of databases each month were exposed, with significant Personally Identifiable Information (PII) leakage. An analysis found that the reputable Amazon Relational Database Service is leaking PII through exposed Relational Database Service (RDS)…
Researchers Discovered High-Severity Remote Code Execution Bug in F5 Products
Experts from Rapid7 observed a customized CentOS installation operating on F5 BIG-IP and BIG-IQ devices found to have various vulnerabilities. While the other flaws are security bypass methods that F5 does not consider vulnerabilities, two of the vulnerabilities have been…
Hackers Hiding Malware Behind The PNG Images Using Steganography
The Worok threat infects victims’ computers with information-stealing malware by concealing malware within PNG images with the help of the Steganography technique, which makes it very difficult to detect by malware scanners. The finding has substantiated one of the most…
Beware! Massive YouTube Campaign Aimed to Steal Login Credentials
There was an extensive phishing campaign that took advantage of YouTube as a vehicle for promoting the download and installation of cracked software and free games. In this campaign, attackers are abusing video tutorial that has the intention of tricking…
Researchers Discovered Hundreds of Amazon RDS Instances Leaking User Personal Data
Recently, the Mitiga Research Team found that hundreds of databases each month were exposed, with significant Personally Identifiable Information (PII) leakage. Particularly, the analysis found that the reputable Amazon Relational Database Service is leaking PII through exposed Relational Database Service…
Google to Pay $391M Fine for Android User Location Tracking Practices
To settle a privacy lawsuit brought by a group of attorneys general from 40 different U.S. states, Google has agreed to pay $391.5 million. Reports say U.S. Michigan will earn close to $12 million from the settlement, which is the…
KmsdBot – A Malware Written in Golang Infects Via SSH To Perform DDoS Attack
Recently, a new piece of evasive malware has been discovered that is able to gain entry into enterprise systems in order to mine cryptocurrency by exploiting a key internet-facing protocol. Researchers have discovered that the malware is capable of launching…
Massive Black Hat Malware Infect 2500 Websites By Injecting Malicious JavaScript
Recently, the cybersecurity researchers of Sucuri have found that threat actors are conducting a tremendous massive black hat search engine optimization (SEO) campaign. However, nearly 15,000 websites redirected visitors to participate in fake Q&A discussion forums in this campaign. Over…
Hackers Hiding Malware Behind The PNG Images Using Steganography
The Worok threat infects victims’ computers with information-stealing malware by concealing malware within PNG images with the help of the Steganography technique, which makes it very difficult to detect by malware scanners. The finding has substantiated one of the most…
Beware! Massive YouTube Campaign Aimed to Steal Login Credentials
There was an extensive phishing campaign that took advantage of YouTube as a vehicle for promoting the download and installation of cracked software and free games. In this campaign, attackers are abusing video tutorial that has the intention of tricking…
Malware Spotted on the Google Play Store Steals Banking Credentials & Intercepts SMS Messages
The Zscaler ThreatLabz team found the ‘Xenomorph’ banking trojan embedded in a Lifestyle app in the Google Play store. The app’s name is “Todo: Day manager,” and has more than 1,000 downloads. The trojan called ‘Xenomorph’ steals login information from…
Google Pixel Lock Screen Bypass Let Attacker Unlock the Screen Without PIN
A lock screen bypass vulnerability that affects all Pixel phones has been discovered by an ethical hacker. On his Pixel 6, David Schutz discovered a troublesome problem. The hacker, however, thinks that every Pixel phone possesses a flaw. Nevertheless, a…
Over 15,000 Websites were Hacked to Redirect Visitors to Fake Q&A Websites
Sucuri observed hackers compromising around 15,000 websites as part of a huge black hat SEO campaign in order to redirect visitors to fake Q&A discussion boards. “Our research team has tracked a surge in WordPress malware redirecting website visitors to…