AgentTesla is a notorious malware that functions as a keylogger and information stealer. By logging keystrokes and capturing screenshots on infected systems, this notorious malware targets sensitive data like:- Recently, the cybersecurity researchers at BitSight Security discovered that AgentTesla malware…
Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Mirai-Based NoaBot Launches a DDoS Attack on Linux Devices
Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things (IoT) devices. Mirai’s ability to recruit a massive number of compromised devices allows attackers to do the following things to…
Adobe Substance 3D Stager Let Attacker Execute Arbitrary Code
Adobe has released a security update that fixes “Important-severity” vulnerabilities in its Substance 3D Stager product. The successful exploitation of these issues could result in a memory leak and arbitrary code execution in the current user’s context. Adobe Substance 3D…
Apple AirDrop Hacked by China to Gain Access to Private Information
AirDrop was introduced in iOS 7, which allows Apple users to transmit files between iOS and macOS systems. Moreover, this does not require an internet connection or a phone book contact for the receiver to receive files. However, it has…
Water Curupira Hackers Launch Pikabot Malware Attack on Windows Machine
Pikabot is a loader malware that is active in spam campaigns and has been used by the threat group Water Curupira, which has been paused from June to September 2023 after Qakbot’s takedown. However, the surge in Pikabot phishing campaigns…
Beware! Hackers Using YouTube Channels to Deliver Lumma Malware
Hackers use YouTube channels to deliver malware due to the huge user base of the platform. By using YouTube channels, hackers disguise their malicious content as:- Besides this, the popularity of YouTube also gives the threat actors the ability to…
Hackers Using Weaponized PDF Files to Deliver Qakbot Malware
Qakbot is a sophisticated banking trojan and malware that primarily targets financial institutions. This sophisticated malware steals sensitive information such as:- While hackers exploit Qakbot to conduct:- Qakbot malware returns after the “Duck Hunt” bust. Not only that, even Microsoft…
Cacti Blind SQL Injection Flaw Enables Remote Code Execution
Cacti, the performance and fault management framework, has been discovered with a blind SQL injection vulnerability, which could reveal Cacti database contents or trigger remote code execution. The CVE for this vulnerability has been assigned with CVE-2023-51448, and the severity…
Cacti Blind, SQL Injection Flaw, Enables Remote Code Execution
Cacti, the performance and fault management framework, has been discovered with a blind SQL injection vulnerability, which could reveal Cacti database contents or trigger remote code execution. The CVE for this vulnerability has been assigned with CVE-2023-51448, and the severity…
Multiple QNAP High-Severity Flaws Let Attackers Execute Remote Code
QNAP has released multiple security advisories for addressing several high, medium, and low-severity vulnerabilities in multiple products, including QTS, QuTS hero, Netatalk, Video Station, QuMagie, and QcalAgent. QNAP has also stated all the affected products and their versions and the…
Accenture Buys 6point6 to Expand Cyber Portfolio
Accenture, a global professional services company, has made a strategic move in the U.K. market by acquiring 6point6, a leading technology consultancy specializing in cloud, data, and cybersecurity. This acquisition, announced on October 31, 2023, significantly enhances Accenture’s capabilities in…
Incorporating Mobile Threat Defense into Your Device Management Ecosystem
In recent years, we have seen a significant shift in the global workforce. With the proliferation of high-speed internet and advanced communication tools, remote work has become the new norm for countless professionals. This transition hasn’t just been about convenience;…
Surge in Open Source Malware Stealing Login Credentials & Sensitive Data
Over the decade, Python has been dominating the programming languages and consistently growing with open-source love. Numerous popular Python projects exist that are used by millions of users. However, besides this, in recent times, it’s been noted that open-source malware…
AsyncRAT Malware Attacking the US Infrastructure for 11 Months
AsyncRAT is an open-source remote access Trojan (RAT) malware known for its ability to provide unauthorized access and control over infected systems. It was released in 2019. Hackers use it actively for various malicious purposes, including:- Cybersecurity researchers at AT&T…
xDedic Marketplace Admin and Operators Arrested
In a landmark victory for cybersecurity, the xDedic Marketplace, a notorious haven for cybercrime, has been shut down. This international operation, spearheaded by the U.S. Attorney’s Office, FBI, IRS-CI, and a consortium of law enforcement agencies from Belgium, Ukraine, and…
3 New Malicious PyPI Packages Found Installing CoinMiner on Linux Devices
Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device performance. These packages, namely modular even-1.0, driftme-1.0, and catme-1.0, come from a recently established author account called “sastra” and exhibit an intricate…
UAC-0050 Group Using Remcos RAT to Attack Government Agencies
Remcos RAT (Remote Control and Surveillance) is a type of Remote Access Trojan used for unauthorized access and control of a computer system. It allows threat actors to perform various malicious activities like:- Cybersecurity researchers at Uptycs recently discovered that…
Google Chrome Use After Free Flaw Let Attacker Hijack Browser
The latest stable channel update for Google Chrome, version 120.0.6099.199 for Mac and Linux and 120.0.6099.199/200 for Windows, is now available and will shortly be rolled out to all users. Furthermore, the Extended Stable channel has been updated to 120.0.6099.200 for…
Free Decryptor Tool Released for the Black Basta Ransomware
A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor tool. Active since April 2022, the Black Basta ransomware group employs a double extortion strategy, encrypting the vital servers and…
Four Cyber Criminals Convicted of Spreading ChatGPT-Assisted Ransomware
Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its sort in China, where OpenAI’s popular chatbot is not legally available, and Beijing has been tightening down on foreign AI.…