This article has been indexed from GBHackers On Security The audio decoders in Qualcomm and MediaTek chips have been reported to contain three security vulnerabilities. Leaving unpatched three of these security holes could provide the threat actors with remote access…
Category: GBHackers On Security
Hackers Sending Poisoned Resumes to steal Credentials and Bank Details
This article has been indexed from GBHackers On Security More_eggs is malware that is specially designed to steal valuable credentials like usernames and passwords for corporate bank accounts, email accounts, and IT admin accounts. In April 2021, Threat actors conducted…
Most Important Web Application Pentesting Tools & Resources – 2022
This article has been indexed from GBHackers On Security Web Application Pentesting Tools are more often used by security industries to test the vulnerabilities of web-based applications. Here you can find the Comprehensive Web Application Pentesting ToolsWeb Application Penetration Testing…
Pwn2Own – Hackers earn $400K for 26 zero-day Exploits
This article has been indexed from GBHackers On Security There has been a lot of excitement surrounding Pwn2Own Miami for 2022 and it was an incredible three-day competition. Over $400,000 has been awarded for 26 unique 0-days and bug collisions.…
Hive Ransomware Affiliate Attacking Microsoft Exchange Servers vulnerable to ProxyShell Flaw
This article has been indexed from GBHackers On Security The cybersecurity experts at Varonis security firm have recently discovered a Hive ransomware affiliate that has been deploying a variety of backdoors, including the Cobalt Strike beacon, in order to compromise…
A New zero-click iMessage Exploit Used to Install NSO Group Spyware on iPhones
This article has been indexed from GBHackers On Security A new zero-click iMessage exploit has been discovered by the security analysts at Citizen Lab that has been used by the threat actors to install NSO Group spyware on the iPhones…
A New Version of SolarMarker Malware Steals Passwords and Credit Card Data
This article has been indexed from GBHackers On Security SolarMarker’s latest version, which augments its capabilities, has been revealed recently by cybersecurity researchers PaloAlto Networks. While this new version of SolarMarker (aka Jupyter) is designed to enhance its defense capabilities…
Lazarus Group Targeting Organizations in the Cryptocurrency and Blockchain
This article has been indexed from GBHackers On Security The FBI, CISA, and the U.S. Department of Treasury have issued a joint statement about the cryptocurrency theft and the tactics used by the North Korean State-Sponsored APT hacker group since…
Beware of the new WhatsApp Voice Message Phishing Campaign that Delivers Malware
This article has been indexed from GBHackers On Security Information-stealing malware has been on the rise since the start of 2022. Many malware campaigns were conducted and millions of people were attacked within the first quarter of 2022. However, Researchers…
15-Year-old Security Vulnerability In The PEAR PHP Repository Permits Supply Chain Attack
This article has been indexed from GBHackers On Security PEAR PHP repository has been found to contain a 15-year-old security vulnerability that could provide an attacker with the ability to carry out a supply chain attack on the system. The…
Brokenwire – A New Wireless Attack that Halts Charging System for Electric Vehicles
This article has been indexed from GBHackers On Security In collaboration with Armasuisse and Swiss researchers, the cybersecurity researchers at Oxford University have discovered a novel attack method for remotely stopping EV charging. CCS (Combined Charging System) is a standard…
Two Teenagers of Lapsus$ Hacking Group Charged
This article has been indexed from GBHackers On Security The Lapsus$ hacking group has been on the headlines ever since they hacked the biggest firms like Microsoft, Nvidia, Samsung, etc. Many law enforcement agencies were on their tail. They have…
BlackGuard – New Password Stealing Malware Sold In Russian Hacking Forum
This article has been indexed from GBHackers On Security Malware-as-a-service is becoming one of the greatest contributors to cyberattacks since it makes entry for cybercriminals extremely easier. This is because most of the hacking forums are selling malware, trojans, and…
Russia Linked Android Malware Access Camera, Audio & Location
This article has been indexed from GBHackers On Security Hacking group Turla is part of the Russian intelligence service that utilizes custom malware to perform cyberespionage mainly to target systems and entities from:- Europe America It may be the Turla…
Chinese Hackers Are Abusing Log4Shell to Deploy Rootkits on VMware Horizon Servers
This article has been indexed from GBHackers On Security A new rootkit named Fire Chili has been deployed on VMware Horizon servers by the Chinese hacking group Deep Panda using the Log4Shell exploit to steal certain sensitive data from the…
Hackers Pushed Mars Stealer Malware via OpenOffice Ads on Google
This article has been indexed from GBHackers On Security Mars Stealer, a recently launched data-stealing malware variant, has recently gained massive popularity. However, the first large-scale attack employing it has been identified by Morphisec’s cybersecurity experts. A re-design of Oski…
Google Chrome 100 Released – Security Fixes, New Logo & More
This article has been indexed from GBHackers On Security The all-new Chrome 100 for the Stable desktop channel has been released by Google on March 29th, 2022. The new Google Chrome 100 (100.0.4896.60) includes several new additions like:- A new…
Chinese Threat Actor Targeting Ukraine Since the Russian Invasion
This article has been indexed from GBHackers On Security For the first time since Russia invaded Ukraine, the Computer Emergency Response Team (CERT-UA) of Ukraine has revealed recently that Chinese threat actors have publicly targeted their systems. A custom backdoor…
Honda Bug Let Attackers Unlock and Start the Car
This article has been indexed from GBHackers On Security Honda and Acura have recently been found to have a vulnerability that allows an attacker to remote start the engine and unlock your car from a nearby distance using a ‘replay…
HackerOne Removed Kaspersky Bug Bounty Program From Its Platform
This article has been indexed from GBHackers On Security HackerOne is one of the biggest bug bounty platforms for all security researchers and companies. Lots of bugs have been discovered by individual researchers at HackerOne which prevented several security misconfigurations.…
Hackers Use XLL Files to Deliver Obfuscated Version of JSSLoader
This article has been indexed from GBHackers On Security Recently it has been observed that Morphisec Labs has witnessed a new wave of JSSLoader infections this year. JSSLoader activity has been tracked by Morphisec Labs since December 2020, and a…
The Largest Online Marketplace of Stolen Login Credentials Seized by Law Enforcement
This article has been indexed from GBHackers On Security On March 16, 2022, a federal grand jury put on trial Igor Dekhtyarchuk, a citizen of the Russian Federation (Russia), with charges for running a cyber-criminal marketplace that sold thousands of stolen…
Lapsus$ Hacking Group Claims to Have Stolen Sensitive Data From Software Gaint Okta Solutions
This article has been indexed from GBHackers On Security Recently on March 22, 2022, several screenshots from the computer of one of Okta’s third-party support technicians were published online by the Lapsus$ hacking group claiming to have stolen sensitive data. …
Hundreds of HP Printer Models Affected by Critical Remote Code Execution
This article has been indexed from GBHackers On Security A number of HP printer models, including LaserJet Pro, Pagewide Pro, OfficeJet, Enterprise, Large Format, and DeskJet, have been updated recently to address three security issues rated as critical. Initially, there…
Microsoft has Confirmed that they Were Compromised by the Lapsus$ Hacking Group
This article has been indexed from GBHackers On Security The Lapsus$ hacking group recently compromised one of Microsoft’s employees, which allowed the threat actors to steal parts of Microsoft’s source code. There is evidence of a destructive element within Microsoft…
BitRAT Disguised as Windows 10 License Verification Tool to Compromise PC
This article has been indexed from GBHackers On Security BitRAT is one of the best Remote Access Trojan (RAT) available for sale in a hacking forum since 2020. Attackers rely on this RAT mostly because of its salient features like…
Facestealer Infects 100,000+ Users Distributed Through Google Play
This article has been indexed from GBHackers On Security “Craftsart Cartoon Photo Tools,” one of the most popular mobile apps on the official Google Play store, has registered more than 100,000 downloads. However, the app is actually infected with Facestealer…
EU and US Agencies Warns that Russia Could Attack Satellite Communications Networks
This article has been indexed from GBHackers On Security In light of recent attacks on satellite networks in Europe sparked by the war in Ukraine, the U.S. government warns that such attacks might soon spread to the United States. The…
Anonymous Group Hacked Russian Oil Pipeline Giant and Released 79 GB of Stolen Data
This article has been indexed from GBHackers On Security Cyberattacks on Russia have been on the rise since their invasion of Ukraine. On February 25th, the Anonymous group posted on Twitter, “The Anonymous Collective is officially in cyberwar against the…
Russia Based Cyclops Blink Malware Targeting ASUS Routers Models
This article has been indexed from GBHackers On Security ASUS has recently published a security advisory containing mitigation measures for the Russian-linked Cyclops Blink threat that has affected various of its router models. Several researchers suspect that Cyclops Blink, a…
CISA Has Added 15 New Flaws to the List of Actively Exploited Vulnerabilities
This article has been indexed from GBHackers On Security CISA is known for publishing various reports and remediations for cyberattacks. They release a list of many known exploited vulnerabilities which are exploited by hackers frequently. They have added a list…
Hundreds of GoDaddy’s Managed WordPress Sites Infected With Same Backdoor Payload
This article has been indexed from GBHackers On Security The Wordfence Incident Response team has recently discovered that hundreds of websites that are hosted on GoDaddy’s managed WordPress service are infected with the same backdoor payload. For the occurrence of…
FBI Warns that Hackers Gain Network Access by Exploiting MFA and “PrintNightmare” Vulnerability
This article has been indexed from GBHackers On Security The CSA and FBI have collaboratively conducted various types of analysis over hacking activity. There have been speculations on Russian State-Sponsored threat actors and their targets over Ukraine and other parts…
HackerOne Apologized to Ukrainian Hackers After Blocking their Bounty Payouts
This article has been indexed from GBHackers On Security After sanctions were imposed on Russia and Belarus after Ukraine’s invasion, the CISO of HackerOne, Chris Evans, apologized to Ukrainian hackers for blocking their bug bounty payouts. Bug bounty platform, HackerOne…
Android Trojan On the Google Play Store With Over 500,000 Installs Steals from Notifications
This article has been indexed from GBHackers On Security On the Google Play Store, the cybersecurity analysts at Dr.Web have recently witnessed a major tip in trojan infiltration. Not only that even they have also detected one application that has…
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges and Inject Malicious Code
This article has been indexed from GBHackers On Security QNAP, the maker of network-attached storage (NAS) appliances, has recently released a warning statement that its products might be vulnerable to recent Linux vulnerabilities that could be exploited to gain access…
1Password to Pay Record High Bounty for Security Researchers
This article has been indexed from GBHackers On Security 1Password is a password management software used by several Information Technology related companies for easing their login. The software handles several usernames and passwords based upon the websites that the customers…
Hackers Using Cheat Lures to Distribute Powerful Information Stealer Malware
This article has been indexed from GBHackers On Security A malware distribution campaign has been detected recently by Korean cybersecurity researchers and ASEC security firm. In this malicious campaign, to trick the Velorant players on YouTube, the hackers are using…
Russia Banned Instagram After Blocking Facebook and Twitter
This article has been indexed from GBHackers On Security The Federal Service for Supervision in the Sphere of Telecom, Information Technologies, and Mass Communications (Roskomnadzor) has recently proclaimed that after blocking the major social network players, Facebook and Twitter, now…
Kali Unkaputtbar – A new Boot Menu to Boot Directly into Snapshots
This article has been indexed from GBHackers On Security A new feature has been introduced recently for Kali Linux by Offensive Security, dubbed as Kali Unkaputtbar. This newly added feature offers the users of Kali Linux a new menu to…
Russia Created Own TLS Certificate Authority (CA) to Access Problems Imposed by Western Companies
This article has been indexed from GBHackers On Security To fix the website access issues that have been building up after sanctions that are imposed by the western companies have prevented the renewal of certificates. That’s why to mitigate this…
Russian based APT Groups Conduct Phishing Campaigns Targeting Ukraine
This article has been indexed from GBHackers On Security Google’s Threat Analysis Group (TAG) have been sending warnings to Ukraine and its government about hackers from Russia. In a span of 1 year, TAG has issued several warnings about government-backed…
Critical Vulnerabilities In APC Smart-UPS Devices Let Attackers Remotely Manipulate The Power
This article has been indexed from GBHackers On Security The cybersecurity firm, Armis has recently discovered that Schneider Electric’s subsidiary, APC Smart-UPS devices, are vulnerable to attacks, as, in PC Smart-UPS devices, three critical vulnerabilities were detected. An APC Smart-UPS…
Anonymous Has Hacked Public Cameras in Russia and Announced a Clamorous Leak
This article has been indexed from GBHackers On Security In a surprising move, Anonymous and other hacker groups have recently taken over more than 400 Russian cameras. The attack was in support of the Ukrainian cyber-warfare group Cyber-Berkut. This group…
Samsung Confirmed that Hackers Stole Galaxy Devices Source Code
This article has been indexed from GBHackers On Security The Tech giant reported that their systems were compromised by the hacker group LAPSUS$ who were also responsible for the Nvidia data breach. On February 28, hackers gained access to Samsung’s…
New 16 High-Severity UEFI Firmware Bugs Uncovered in Millions of HP Devices
This article has been indexed from GBHackers On Security The cybersecurity analysts at HP have recently revealed 16 high-severity UEFI firmware bugs in millions of HP devices. And by exploiting these vulnerabilities a threat actor can gain high privileges on…
SharkBot – New Generation Malware on Google Play Distributed as Android Antivirus App
This article has been indexed from GBHackers On Security While malware distributors may have a harder time getting their malicious apps through Google’s automatic scanning and flagging system, but, SharkBot shows that they can easily bypass the company’s security barriers…
Similarities and Difference Between Ransomware and DDoS Extortion Attacks
This article has been indexed from GBHackers On Security Cybercriminals leverage multiple methods to bring financial gain. Most of the ways are based on infiltrating an organization’s network and gaining unauthenticated access, which will lead to disruption in their operations.…
Emergency Patch – 2 New Mozilla Firefox 0-Day Bugs Under Active Attack
This article has been indexed from GBHackers On Security Mozilla has recently released new versions of Firefox to fix two new critical zero-day vulnerabilities that are actively exploited by the threat actors. The two critical zero-day vulnerabilities detected are Use-after-free…
Ransom DDoS Attack that Reached a Rate of 2.5 Million Requests per Second
This article has been indexed from GBHackers On Security Imperva security firm recently claimed that it has managed to foil a massive ransom distributed denial-of-service (DDoS) cyberattack that peaked at 2.5 million requests per second recently (on a single server),…
A Complete Guide to Perform External Penetration Testing on Your Client Network | Step-by-Step Methods
This article has been indexed from GBHackers On Security This write-up walks us through one of my many journeys in my external penetration testing and how I compromised the organization in this write-up. After executing security assessments (e.g. Penetration Testing,…
Russia Blocked Access to Facebook, Twitter, Foreign News Outlets
This article has been indexed from GBHackers On Security Lots of things have been happening ever since the invasion of Russia on Ukraine. People all over the world have been supporting both Russia and Ukraine. The Russian government came to…
Avast Released Free Decryptor for HermeticRansom Ransomware to help Ukraine
This article has been indexed from GBHackers On Security Recently CISA and the FBI were warning organizations in Ukraine about the HermeticWiper malware which was targeting computers at Ukrainian organizations to erase the data. One of the variants of HermeticWiper…
Critical Flaws With Cisco Expressway Series and TelePresence VCS Let Attackers Execute Arbitrary Code
This article has been indexed from GBHackers On Security Cisco recently released a patch for a new generation of exploits that target some of its recently shipped products (Expressway Series and Cisco TelePresence Video Communication Server (VCS)). This security flaw…
Namecheap To Offer Free Anonymous hosting, Domains for any anti-War Sites
This article has been indexed from GBHackers On Security Namecheap recently made a statement that they are restricting their services to Russian entities and asked them to migrate to another provider. In addition to that, Russian domains will become 403…
Russia Said Hacking Russian Satellite Infrastructure is an Act of war
This article has been indexed from GBHackers On Security The head of the Russian Roscosmos State Space Corporation, Dmitry Rogozin has recently affirmed that Russia will consider any hacking of its satellites as an act of war. Not only that…
TeaBot Banking Trojan Posted as QR Code app in Google Play Store Targeting US Users
This article has been indexed from GBHackers On Security At the beginning of 2021, a new type of trojan called “Teabot” was found attacking users. The trojan was specifically designed to steal the victim’s bank credentials and SMS messages. Other…
CISA and FBI Warn of Destructive Malware to Destroy Ukraine computer Systems
This article has been indexed from GBHackers On Security As tension arises between Russia and Ukraine, the CISA (Cybersecurity and Infrastructure Security Agency) has posted that computer systems in Ukraine are being targeted by threat actors as they seek to…
Anonymous Hacker Group Hit Russian Nuclear Institute and Leak Stolen Data
This article has been indexed from GBHackers On Security The Anonymous group along with several other hacking groups have recently attacked the Russian nuclear institute and leaked all the compromised data. Apart from this, they have also launched several cyberattacks…
Microsoft Said that Destructive Cyberattacks were Directed Against Ukraine Before the Launch of Missiles
This article has been indexed from GBHackers On Security The conflict between Russia and Ukraine is taking severe shape at the moment and Microsoft has recently claimed that destructive cyberattacks and FoxBlade malware were directed against Ukraine before the launch…
New Malware Through Microsoft’s Official Store Infected Over 5,000 Machines
This article has been indexed from GBHackers On Security The cybersecurity company Check Point of Israel has spotted a new malware and named it Electron Bot. This malware has the ability to control different social media accounts that are specifically…
Fileless Malware SockDetour Remain stealthily on Compromised Windows servers
This article has been indexed from GBHackers On Security The cybersecurity researchers of Unit 42 have tracked an APT campaign and in that, they have noted a tool named SockDetour. It is a backup backdoor, and the threat actors have…
The UK and US Cybersecurity Agencies Said Cyclops Blink Malware Linked to Russian State Hackers
This article has been indexed from GBHackers On Security The UK and US cybersecurity agencies have recently linked a new malware called Cyclops Blink to the Russian state hacker group, Sandworm which is also known as Voodoo Bear. While cybersecurity…
Ukraine Calls country’s Underground Hacker Help to Protect Critical Infrastructure
This article has been indexed from GBHackers On Security The Ukrainian Government has stumbled since the attack from Russia has been increasing steadily. Russian forces have attacked many Ukraine cities leaving many residents homeless. Most of the residents fled to…
Ukraine Said Government Websites and Banks Suffered a Massive DDoS Attack
This article has been indexed from GBHackers On Security The Ukraine government officials have claimed that again multiple government and banking organizations’ portals have experienced a massive DDoS attack recently. All these cyberattacks have been developed by the threat actors…
Law enforcement Officers Busted Phishing Group That Uses 40 Websites to Steal Credit Card Data
This article has been indexed from GBHackers On Security On 22nd February 2022, Ukrainian Police officials arrested a group of threat actors that were involved in a phishing campaign. They used a mobile replenishment service as their disguise to conduct…
Flaws With Horde Webmail Let Attackers Gain Full Access to the Email Account
This article has been indexed from GBHackers On Security Cybersecurity experts have urged companies and users to immediately change the default setting of the Horde Webmail who use the Horde Webmail application to view their emails. As recently, it has…
Google Introduced Privacy Sandbox Aimed to Improve Digital Privacy of Users
This article has been indexed from GBHackers On Security Google has become an inevitable thing in our day-to-day life. Especially, mobile apps are being developed every day to make life better with technology. Although Google owns most of these technologies,…
Hackers Use SMS-intercepting Malware to Exploit Android Devices and to Register Disposable Accounts
This article has been indexed from GBHackers On Security Trend Micro cybersecurity researchers have recently noticed that in the last two years, there was a huge increase in short message service SMS and phone-verified account PAV. However, this service has…
U.S. Agency Compiled List of Free Cyber Security Tools to Help Organizations Detecting Malicious Attacks
This article has been indexed from GBHackers On Security The U.S. cybersecurity agency, CISA has recently compiled a list of Free Cyber Security Tools and services for the organizations through which they can efficiently increase their security and defend against…
PseudoManuscrypt Malware Distributed as Crack and Keygen Steals Sensitive Information
This article has been indexed from GBHackers On Security The cybersecurity analysts at ASEC security firm have recently identified a new malware that is dubbed as PseudoManuscrypt on numerous Windows systems that are located in South Korea. While this new…
VMware Issues Patches for Shell Injection and Privilege Vulnerability
This article has been indexed from GBHackers On Security VMware had multiple issues that were privately reported. VMware swiftly acted on the reported issues and released patches for all the critical vulnerabilities. The vulnerability details are as follows Advisory ID:VMSA-2022-0004CVSSv3…
New Botnet Dubbed Kraken Deploys Backdoor to Steal Sensitive Information from Windows Hosts
This article has been indexed from GBHackers On Security The cybersecurity researchers at ZeroFox Intelligence have recently discovered a new Golang-based botnet which is dubbed Kraken. This new botnet is under active development and exploited by the threat actors to…
Vulnerable Exchange Server Hit by Squirrelwaffle Malware Loader
This article has been indexed from GBHackers On Security Squirrelwaffle malware has been found in existence since the mid of September 2021. This malware is designed to cause chain infections. The Rapid Response Team at Sophos has recently discovered that…
ShadowPad Modular Malware Platform Used by Chinese Hackers in High-profile Attacks
This article has been indexed from GBHackers On Security A very sophisticated and modular backdoor, ShadowPad has been discovered recently by the cybersecurity analysts of Pwc and Secureworks security firm that is actively used by the Chinese threat actors to…
Kali Linux 2022.1 Released with New Tools and Kali Everything Image
This article has been indexed from GBHackers On Security Offensive Security has recently released the new version of Kali Linux, Kali Linux 2022.1 that brings some exciting new features, and this version is the first release of 2022. In this…
Critical Magento 0-Day Let Attackers Execute Arbitrary Code
This article has been indexed from GBHackers On Security Security updates for Adobe Commerce and Magento Open Source have been released by Adobe. At the end of this January, Sansec reported a security breach at more than 500 online stores…
Hackers Injected Credit Card Skimmers to 500 Stores Running With Magento
This article has been indexed from GBHackers On Security On January 25, Sansec posted a tweet that nearly 300+ e-commerce stores were infected with malware. Sansec detected a massive data breach at 500 stores which were running on Magento 1. Magento…
FritzFrog Botnet Targeting SSH server, Data Center Servers, and Routers
This article has been indexed from GBHackers On Security FritzFrog botnet has been continuously targetting different systems for more than two years. The Cybersecurity researchers of Akamai security company have recently noted a new version that has a unique function…
ModifiedElephant APT Hacker Group Remain Secret For Years Using Advanced Sophisticated Techniques
This article has been indexed from GBHackers On Security It’s been reported recently that the ModifiedElephant APT Hacker group remains secret for years using advanced sophisticated techniques. And the cybersecurity researchers of SentinelLabs have asserted these specified details regarding the…
Microsoft To Block Internet Macros by Default to Block Hack Attacks
This article has been indexed from GBHackers On Security By default, Microsoft will block the execution of VBA macros in five Microsoft Office applications to block the hack attacks. Users of the following Microsoft product will not be able to…
CISA Asks Federal Agencies to Fix Win32k Privilege Escalation Flaw as Threat Actors Actively Exploiting
This article has been indexed from GBHackers On Security The Cybersecurity and Infrastructure Security Agency (CISA) has recently commanded the Federal Agencies to immediately fix the Win32k privilege escalation flaw, as the threat actors are actively exploiting this security flaw.…
SSL Certificate: 7 Important Factors to Know to Make an Informed Decision
This article has been indexed from GBHackers On Security SSL certificates are pretty much non-negotiable for websites today! A whole range of SSL products is available in the market today to encrypt communications, strengthen SSL security and improve search rankings.…
ACTINIUM Hackers Group Targeting Government, Military, NGO to Steal Sensitive Data
This article has been indexed from GBHackers On Security Microsoft has recently announced that a cybersecurity hacking group that is known as Gamaredon is creating a streak of spear-phishing emails. But, in the recent event, it has been detected that…
Critical Flaws in Cisco Small Business Routers let Attackers Execute Arbitrary code
This article has been indexed from GBHackers On Security Multiple critical vulnerabilities have been detected that are affecting Cisco Small Business RV series routers. But, Cisco has already released the patches to fix all the critical vulnerabilities since they could…
ESET Antivirus Flaw Let Attackers to Escalate Privileges & Execute Arbitrary Code
This article has been indexed from GBHackers On Security ESET has recently published patches to fix a local privilege escalation vulnerability detected in all the clients of its Windows products that enables the threat actors to escalate privileges and execute…
Shuckworm Group uses Weaponized Word Document to Infect Victims Computer
This article has been indexed from GBHackers On Security Symantec’s Threat Hunter team has recently discovered a hacking group which is dubbed as Shuckworm that has its root links with Russia using weaponized word documents to infect their targets’ computers…
DrawnApart – A New Fingerprinting Technique Used to Track Your Activities Online
This article has been indexed from GBHackers On Security Recently to create unique digital fingerprints and use them for web surveillance purposes, the cyber security analysts from Ben Gurion University, the University of Lille, and the University of Adelaide have…
North Korean Hacker Group Deliver KONNI Rat Malware Using Weaponized Office Document
This article has been indexed from GBHackers On Security The North Korean threat actors under the Kimsuky Umbrella are using a piece of malware which is called KONNI. KONNI is a RAT (Remote Administration Tool) that is under the radar…
North Korean Hackers Leverages Windows Update Client to Execute Malicious Payload
This article has been indexed from GBHackers On Security In an on-going latest campaign, the Windows Update client has been recently added to the living-off-the-land binaries (LoLBins) list of Lazarus, a North Korean-backed hacking group, and not only that even…
LockBit Linux-ESXi Locker Ransomware Variant Targets VMware ESXi Servers
This article has been indexed from GBHackers On Security The new ransomware group, LockBit, is targeting the VMware ESXi servers or virtual machines with their new Linux encryptor that is dubbed as “LockBit Linux-ESXi Locker version 1.0.” Nowadays, companies and…
Multiple Flaws in Control Web Panel Let Attacker Execute Code as Root on Linux Servers
This article has been indexed from GBHackers On Security Recently two critical vulnerabilities were detected by the cybersecurity analysts of Octagon Networks in the Control Web Panel (formerly also known as CentOS Web Panel) that is commonly known as CWP…
Hackers Infect Apple’s macOS by Leveraging a Safari Web Browser Exploit
This article has been indexed from GBHackers On Security A never-seen-before malware that is dubbed as “DazzleSpy” has been found in macOS by the cybersecurity researchers at ESET security, leveraging a Safari web browser exploit. The hackers are found using…
OpenSubtitles Hacked – Over 7 million Subscribers Email, IP Addresses & Usernames Leaked
This article has been indexed from GBHackers On Security On January 18, opensubtitles.org, one of the largest subtitles websites, faced a data breach. OpenSubtitles posted on their forum that they were contacted by a hacker on telegram in August 2021.…
Emotet Uses Unconventional IP Address Formats to Spread Malware & Evade Detection
This article has been indexed from GBHackers On Security In a recent ongoing Emotet malware campaign, it has been identified that the threat actors behind this malicious campaign are using the unconventional IP address formats for the first time to…
Chinese APT Hackers Deploys MoonBounce Implant In UEFI Firmware
This article has been indexed from GBHackers On Security Kaspersky Lab experts have recently discovered a security vulnerability in UEFI firmware, and this vulnerability was detected while studying the Firmware Scanner logs at the end of 2021. During the further…
A New Spyware Campaign Attack Industrial Enterprises To Steal Corporate Credentials
This article has been indexed from GBHackers On Security Several spyware campaigns have been discovered recently by the security researchers at Kaspersky Labs in which the industrial enterprises were targeted by the threat actors to steal corporate credentials and resell…
Google Details Two Zero-Click Bugs in Zoom Clients That Let Attackers Execute Malicious Code
This article has been indexed from GBHackers On Security Two zero-click bugs in Zoom clients have been detected recently by the security analyst Natalie Silvanovich of Google’s Project Zero that enables the threat actors to execute malicious code. By exploiting…
Microsoft Lists 25 Windows Policies That Admins Should Not Use in Windows 10 & Windows 11
This article has been indexed from GBHackers On Security Microsoft for Windows 10 and Windows 11 has recently listed 25 dead administrative templates (ADMX) policies in which Microsoft has clearly notified the IT Professionals to stop utilizing them. At Microsoft,…
Cisco StarOS Flaw Let Attackers Gain Remote Code Execution on Vulnerable Device
This article has been indexed from GBHackers On Security Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software had multiple vulnerabilities which could allow an unauthenticated attacker to execute arbitrary commands or disclose sensitive information with “root” privileges. These vulnerabilities…