HackerGPT is a cutting-edge AI tool designed explicitly for the cybersecurity sector, particularly beneficial for individuals involved in ethical hacking, such as bug bounty hunters. This advanced assistant is at the cutting edge of cyber intelligence, offering a vast repository…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
FTC Orders Avast To Pay $16.5M For Selling User’s Browsing Data
AV (antivirus) companies normally do not sell user’s browsing data, as it goes against their commitment to user privacy and security. Their business model relies on protecting against cyber threats rather than exploiting user data. But, recently, The Federal Trade…
PyRIT – A Red Team Tool From Microsoft For Generative AI Systems
In a significant move to bolster the security of generative AI systems, Microsoft has announced the release of an open automation framework named PyRIT (Python Risk Identification Toolkit). This innovative toolkit enables security professionals and machine learning engineers to proactively…
Outlook Users Beware 0-Day Exploit Released On Hacking Forums
Outlook has identified a security flaw that affects how it handles certain hyperlinks. Malware actors actively exploit the vulnerability in real-world attacks. The assigned CVE number for this vulnerability is CVE-2024-21413, with a severity rating of 9.8 (Critical). Microsoft has…
Resilience to Acquire BreachQuest for an undisclosed price
In a strategic move to enhance its cyber risk management capabilities, Resilience has announced the acquisition of BreachQuest, an innovative incident response technology firm. This acquisition marks a significant step in Resilience’s efforts to combat the escalating threat of Business…
CISA And FBI Share Cyber Attack Defenses For Securing Water Systems
The Cybersecurity and Infrastructure Security Agency (CISA), the Environmental Protection Agency (EPA), and the Federal Bureau of Investigation (FBI) have collaborated to develop a highly significant cybersecurity guide that is specifically intended for Water and Wastewater Systems (WWS) entities. This…
New Infostealer Malware Attacking Oil and Gas Industry
The oil and gas sector faces a significant cybersecurity threat with the emergence of a new and sophisticated Malware-as-a-Service (MaaS) infostealer known as Rhadamanthys Stealer. This advanced phishing campaign has successfully reached its intended targets within the industry, raising concerns…
How to Analyse Linux Malware in ANY.RUN
Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In 2022, Linux malware incidents surged by 50%, significantly increasing and highlighting the critical need for robust analysis and defense mechanisms.…
Apex Code Vulnerabilities Let Hackers Steal Salesforce Data
Hackers target Apex code vulnerabilities in Salesforce to exploit security weaknesses, gain unauthorized access to sensitive data, or manipulate the system. Apex is a powerful language that enables the customization of Salesforce with Java-like syntax. It executes logic, controls transactions,…
Leak of China’s Hacking Documentation Stunned Researchers
In a startling revelation that has sent shockwaves through the cybersecurity community, a massive data leak has exposed the inner workings of I-Soon (上海安洵), a Chinese tech security firm with deep ties to the country’s government agencies, including the Ministry…
US to Pay $15M for Info About Lockbit Ransomware Operator Data
In a significant move against cybercrime, the U.S. government has announced a bounty of up to $15 million for information that could lead to the identification, arrest, or conviction of individuals associated with the notorious LockBit ransomware group. This announcement…
Beware of New AsukaStealer Steal Browser Passwords & Desktop Screens
An updated version of the ObserverStealer known as AsukaStealer was observed to be advertised as malware-as-a-service that was capable of collecting data from desktop screenshots, Steam Desktop Authenticator application, FileZilla sessions, Telegram sessions, Discord tokens, browser extensions, and cryptocurrency wallets. This…
Earth Preta Hackers Abuses Google Drive to Deploy DOPLUGS Malware
Threat actors abuse Google Drive for several malicious activities due to its widespread use, easy file sharing, and collaboration features. These things provide a convenient platform to host and distribute malware. Integration with legitimate services makes detecting and blocking malicious…
Swiggy Account Hacked, Hackers Placed Orders Worth Rs 97,000
In a startling incident underscoring the growing menace of cybercrime, a woman’s Swiggy account was hacked, leading to fraudulent orders worth Rs 97,000. The Delhi Police swiftly acted on the complaint, arresting two individuals, Aniket Kalra (25) and Himanshu Kumar…
Beware of VietCredCare Malware that Steals businesses’ Facebook Accounts
A new cybersecurity threat targeting Facebook advertisers in Vietnam, known as VietCredCare, has emerged. This information stealer has been active since at least August 2022 and is designed to hijack corporate Facebook accounts by automatically filtering out Facebook session cookies…
Google Chrome 122 Update Addresses Critical Security Vulnerabilities
Google has recently unveiled Chrome 122, a significant milestone for the widely used web browser. The most recent release, compatible with Windows, Mac, and Linux operating systems, includes a set of crucial security patches and novel functionalities that enrich the…
New Malicious PyPI Packages Use DLL Sideloading In A Supply Chain Attack
Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2 infrastructure, storing stolen data, and delivering second and third-stage downloaders or rootkit programs. Two open-source PyPI packages were discovered to…
New Mingo Malware Attacking Linux Redis Servers To Mine Cryptocurrency
The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on the Linux host. The campaign employed many Redis system-weakening commands to potentially disable data store security features that could hinder their initial attempts at access. Additionally, the…
Security Onion 2.4.50 Released for Defenders With New Features
Security Onion Solutions has recently rolled out the latest version of its network security monitoring tool, Security Onion 2.4.50. This updated version comes equipped with an array of new features and bug fixes, making it an even more critical tool…
VMware Urges to Remove Enhanced EAP Plugin to Stop Auth & Session Hijack Attacks
VMware has issued an urgent advisory to administrators to remove a deprecated authentication plugin vulnerable to severe security threats. The Enhanced Authentication Plugin (EAP), which provided seamless login capabilities to vSphere’s management interfaces, is susceptible to authentication relay and session…