The Matanbuchus malware has been reported to initiate a new campaign, exploiting XLS files to compromise Windows machines. This sophisticated threat, known for its loader-as-a-service model, has been active for several years and poses a risk to users worldwide. Matanbuchus,…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Cybercriminals Hacking Systems with 10+ Legitimate Data-Extraction Tools
In recent months, the cybersecurity landscape has witnessed a significant evolution in ransomware attacks, with perpetrators deploying an increasingly diverse array of data-exfiltration tools. Symantec’s latest findings reveal that attackers have utilized at least a dozen different tools for data…
Ransomware Actors Using Dozen of Legitimate Data-Exfiltration Tools to Hack Systems
In recent months, the cybersecurity landscape has witnessed a significant evolution in ransomware attacks, with perpetrators deploying an increasingly diverse array of data-exfiltration tools. Symantec’s latest findings reveal that attackers have utilized at least a dozen different tools for data…
Vulnerability in 16.5K+ VMware ESXi Instances Let Attackers Execute Code
VMware’s ESXi, Workstation, and Fusion products could allow attackers to execute malicious code on affected systems. Impacted VMware Products These vulnerabilities impact the following VMware products: VMware has acknowledged the presence of several vulnerabilities in its products after they were…
New DoNex Ransomware Observed in the Wild Targeting Enterprises
Enterprises across the United States and Europe are on high alert as a new ransomware strain, dubbed “DoNex,” has been actively compromising companies and claiming victims. This emergent threat has cybersecurity experts working overtime to understand the attack’s full scope…
NSA Releases Top Ten Best Practices For Cloud Environments
Threat actors aim at Cloud environments because of their wide acceptance and one-stop storage of important information. Exploiting shortcomings in cloud security may enable unauthorized access to sensitive data, interruptions in infrastructure, or earning money. The fact that the systems…
Nigerian National Pleads Guilty for Hacking Business & Individual Emails
Henry Onyedikachi Echefu, a 32-year-old Nigerian national, has admitted to his role in a sophisticated business email compromise (BEC) scheme and money laundering activities. This case highlights the global nature of cybercrime and the importance of international cooperation in bringing…
MITRE Releases Aviation Risk Identification and Assessment Software Program
The Massachusetts Institute of Technology’s (MITRE) Aviation Risk Identification and Assessment (ARIA) software program is a powerful tool to enhance aviation safety and efficiency. Developed by the MITRE Corporation, a non-profit organization that operates federally funded research and development centers,…
Chinese Panda APT Hacking Websites To Infect Windows And MacOS Users
Evasive Panda dubbed BRONZE HIGHLAND and Daggerfly, a Chinese-speaking APT group operating since at least 2012, has been spotted conducting cyberespionage targeting individuals in mainland China, Hong Kong, Macao, and Nigeria. Southeast and East Asian governments, notably those in China, Macao,…
UAC-0050 Hacked Thousands Of Emails To Launch Malspam Attack
Threat actors target email addresses, as they provide a way to access personal and confidential information. Emails often hold valuable data such as financials, login credentials, and personal messages. The attackers could start different kinds of cyber-attacks and propagate malware…
100% Surge in Malicious Emails Bypassing Secure Email Gateways
The frequency of malicious emails successfully circumventing Secure Email Gateways (SEGs) has doubled in the past year. This surge highlights the evolving sophistication of cyber threats and the challenges organizations face in protecting digital assets. According to Cofense’s analysis, a malicious email bypasses SEGs every minute, signifying a relentless assault on corporate defenses. The…
Google Engineer Arrested for Stealing AI Tech Secrets
A Google engineer has been arrested for stealing trade secrets, particularly those related to artificial intelligence (AI) technology. Linwei Ding, also known as Leon Ding, is a 38-year-old software engineer and resident of Newark, California. A federal grand jury has…
Zama Raises $73M in Series A Led by Multicoin Capital & Protocol Labs for Fully Homomorphic Encryption
Company Open Sources FHE Libraries to Build Privacy-Preserving Blockchain and AI Applications for the First Time. An investment has been secured to bring Fully Homomorphic Encryption (FHE) to the fore, giving developers the ability to address data privacy challenges across…
Server Killers Alliances: Here is the List of Hacker Groups
The hacker group known as Server Killers has announced their participation in a coordinated cyber attack on Moldova. This group has joined forces with several other notorious hacker collectives, signaling a worrying escalation in cyber threats against the Eastern European…
Beware of New Snake Python Infostealer Attacking Facebook Messenger Users
A new menace has emerged targeting unsuspecting Facebook Messenger users. Dubbed the “Python Infostealer,” this malicious software is designed to pilfer credentials through sophisticated means, leveraging popular platforms like GitHub and GitLab for its nefarious purposes. Stealthy Approach of Python…
Hacked WordPress Sites Using Visitors’ Browsers For Distributed Brute Force Attacks
Researchers recently uncovered distributed brute force attacks on target WordPress websites using the browsers of innocent site visitors. A recent increase in website hacking that targets Web3 and cryptocurrency assets was noticed two weeks ago. With the use of cryptocurrency drainers, this…
Cisco SMB Wireless Access Points Flaw Let Attackers Inject Commands
Cisco has alerted its customers to critical vulnerabilities in the web-based management interface of its Small Business 100, 300, and 500 Series Wireless Access Points (APs). These flaws could allow an authenticated, remote attacker to perform command injection and buffer…
New Linux Malware Attacking Apache, Docker, Redis & Confluence Servers
A sophisticated malware campaign targeting servers running popular web-facing services such as Apache Hadoop YARN, Docker, Confluence, and Redis has been identified. This campaign is notable for using unique and previously unreported payloads, including four Golang binaries designed to automate…
Cisco Small Business Wireless Access Points Flaw Let Attackers Inject Commands
Cisco has alerted its customers to critical vulnerabilities in the web-based management interface of its Small Business 100, 300, and 500 Series Wireless Access Points (APs). These flaws could allow an authenticated, remote attacker to perform command injection and buffer…
VMware Critical Flaws Let Attackers Execute Remote Code
Vulnerabilities in VMware software expose it to remote execution of code by threat actors due to critical defects. These are found in different parts of the virtualization platform, management interfaces, and other related tools, making the flaw latent. This can…