Such is the industry, that RISC-V, an open and extensible instruction set architecture (ISA) has now invaded the CPU market, opening up many opportunities for new entrants. It has gained a lot of traction through Linux kernel support as well…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
DISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model
Ransomware affiliates are forming alliances to recoup losses from unreliable partners. A prominent example involves ALPHV extorting $22 million from Change Healthcare but withholding funds from its data exfiltration affiliate. To remedy this, the affiliate has reportedly partnered with RansomHub…
Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices
A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the legitimate iOS 18, tricking users into installing malicious code. The persistence mechanism allows threat actors to maintain covert control over the compromised device, facilitating data exfiltration…
MongoDB Vulnerabilities Let Attackers Escalate Privileges
MongoDB has disclosed a critical vulnerability that could allow attackers to escalate privileges on systems running certain versions of MongoDB. This vulnerability, CVE-2024-7553, affects multiple versions of MongoDB Server, C Driver, and PHP Driver. The flaw stems from incorrect validation…
Authorities Dismantled North Korean Remote IT Worker Laptop Farm
Authorities have dismantled a “laptop farm” in Nashville, Tennessee, allegedly used to support the Democratic People’s Republic of Korea’s (DPRK) weapons program. Matthew Isaac Knoot, 38, has been charged with multiple offenses, including conspiracy to cause damage to protected computers…
STAC6451 Hacker Hijacking Microsoft SQL Servers to Compromise Organizations
A sophisticated threat activity cluster, STAC6451, has been identified targeting Microsoft SQL servers. This cluster, primarily observed by Sophos Managed Detection and Response (MDR) teams, has compromised organizations by exploiting SQL server vulnerabilities. The attackers have been using a combination…
Record Breaking DDoS Attack 419 TB of Malicious Traffic Within 24-Hours
A record-breaking Distributed Denial of Service (DDoS) attack unleashed 419 terabytes of malicious traffic over 24 hours. This unprecedented event, which began at 8:05 UTC on July 15, 2024, targeted a financial services company in Israel, showcasing the evolving threat…
Critical Cisco Small Business IP Phone Flaws Exposes Users to Remote Attacks
Cisco has issued a security advisory warning users of its Small Business SPA300 and SPA500 Series IP Phones about multiple critical vulnerabilities that could allow remote attackers to execute arbitrary commands or cause denial of service (DoS) conditions. These vulnerabilities…
Tor Browser 13.5.2 Released: What’s New!
The Tor Project has announced the release of Tor Browser 13.5.2, now available for download from the Tor Browser download page and the distribution directory. This latest version brings crucial security updates and several enhancements to improve user experience and…
AWS Launches Mithra To Detect Malicious Domains Across Systems
Amazon’s e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework. Amazon, which has a vast online presence covering multiple domains and services, is at great risk of being attacked by advanced cyber threats. For this…
Researchers Proposed MME Framework To Enhance API Sequence-Based Malware Detection
Deep learning models analyzing API sequences for Windows malware detection face challenges due to evolving malware variants. A group of researchers recently proposed the MME framework, which enhances the existing detectors by leveraging API knowledge graphs and system resource encodings. …
Microsoft 365 Vulnerability Let Hackers Bypass Anti-phishing Feature
A vulnerability in Microsoft 365 (formerly Office 365) has been found that allows malicious actors to bypass anti-phishing measures. One of the anti-phishing features available in Exchange Online Protection (EOP) and Microsoft Defender to Office 365 enterprises is the ‘First…
Apple Tightens macOS Gatekeeper Controls in macOS Sequoia
Apple has announced changes to its macOS Gatekeeper security feature with the release of macOS Sequoia. These changes aim to bolster user security by making it more challenging to run potentially harmful software. Stricter Gatekeeper Policies In macOS Sequoia, Apple…
New Zola Ransomware Using Multiple Tools to Disable Windows Defender
Seemingly new ransomware, Zola, is the newest version of the Proton family that appeared in March 2023. This rebranding highlights the unbroken trend of ransomware’s evolution. Cybersecurity researchers at Acronis identified and warned of the new Zola ransomware, which was…
XDSpy Hackers Attacking Users to Steal Sensitive Data
The notorious threat actor group XDSpy has been reported to target organizations in Russia and Moldova. The sophisticated phishing malware campaign aims to steal sensitive data through well-coordinated attack chains. Spear-phishing emails as the Initial Vector According to the Broadcom…
Chrome Security Update: Patch for Multiple Vulnerabilities
Google has announced a critical security update for its Chrome browser, addressing several vulnerabilities that malicious actors could exploit. The Stable channel has been updated to version 127.0.6533.99/.100 for Windows and Mac and 127.0.6533.99 for Linux. This update will be…
Panamorfi TCP flood DDoS Attack Targeting Jupyter Notebooks
An attacker, identified as Yawixooo, leveraged a publicly accessible Jupyter Notebook honeypot as an initial access vector. The honeypot’s exposure to the internet-enabled Yawixooo to exploit it without requiring complex techniques. Once gaining a foothold on the system, the attacker…
North Korean Hackers Exploit VPN Update Flaw To Breach Networks
North Korean state-sponsored hacking groups, including Kimsuky (APT43) and Andariel (APT45), have significantly increased cyberattacks on South Korean construction and machinery sectors. This surge aligns with Kim Jong-un’s “Local Development 20×10 Policy,” aimed at modernizing industrial facilities across North Korea. …
Chameleon Device-Takeover Malware Attacking IT Employees
Researchers have identified a new Chameleon campaign targeting hospitality employees, where the attackers employed a deceptive tactic, disguising malicious software as a CRM app. File names uploaded to VirusTotal revealed evidence of targeted attacks, including a reference to a prominent…
40 French Museums IT Systems Hit by Ransomware Attack
Ransomware has infiltrated the IT systems of 40 French museums, including the renowned Louvre. The incident, which occurred on the night of August 3-4, 2024, was first detected by the director of information systems at the Grand Palais site. The…