An attacker with physical access can abruptly restart the device and dump RAM, as analysis of this memory may reveal FVEK keys from recently running Windows instances, compromising data encryption. The effectiveness of this attack is, however, limited because the…
Category: GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Weaponized Python Scripts Deliver New SwaetRAT Malware
The Python script leverages low-level interactions with the Windows operating system, which imports crucial libraries like `System.Reflection`, `ctypes`, and `wintypes`, enabling it to directly invoke Windows APIs. It allows the script to manipulate system behavior at a fundamental level, potentially…
The Defender vs. The Attacker Game
The researcher proposes a game-theoretic approach to analyze the interaction between the model defender and attacker in trigger-based black-box model watermarking. They design payoff functions for both players and determine the optimal strategies for each player, which provides a theoretical…
Garak – An Open Source LLM Vulnerability Scanner for AI Red-Teaming
Garak is a free, open-source tool specifically designed to test the robustness and reliability of Large Language Models (LLMs). Inspired by utilities like Nmap or Metasploit, Garak identifies potential weak points in LLMs by probing for issues such as hallucinations,…
Malicious npm Packages Stealing Developers’ Sensitive Data
Attackers published 20 malicious npm packages impersonating legitimate Nomic Foundation and Hardhat plugins, where these packages, downloaded over 1,000 times, compromised development environments and potentially backdoored production systems and resulted in financial losses. They are utilizing Ethereum smart contracts, such…
Cybersecurity Firm Tenable’s CEO “Amit Yoran” has Died at 54
Tenable Holdings, Inc. has confirmed the passing of its esteemed Chairman and Chief Executive Officer, Amit Yoran, who succumbed to cancer on January 3, 2025. Yoran, aged 54, was a distinguished figure in the cybersecurity realm, known for his visionary…
Windows Registry Privilege Escalation Vulnerability – PoC Released
Researchers have released a proof of concept (PoC) exploit for a critical privilege escalation vulnerability affecting Microsoft Windows. This vulnerability, CVE-2024-43452, allows attackers to gain elevated privileges on a compromised system, potentially leading to unchecked access to sensitive data and…
How Learning Experience Platforms Are Transforming Training
Within today’s fast-changing global society, effective training is vital for personal and professional success. However, traditional methods often do not provide enough flexibility or personalization options. In light of this, learning experience platforms (LXPs) have revolutionized how organizations and individuals…
Tenable CEO “Amit Yoran” Passed Away at the Age of 54
Tenable Holdings, Inc. has announced with profound sadness the unexpected passing of its Chairman and Chief Executive Officer, Amit Yoran, who succumbed to a battle with cancer on January 5, 2025. A visionary leader, Yoran was a pioneer in the…
North Korean Hackers Wipe Cryptocurrency Wallets via Fake Job Interviews
Cybersecurity experts have uncovered a new wave of cyberattacks linked to North Korean threat actors targeting cryptocurrency wallets in an operation dubbed the “Contagious Interview” campaign. The attackers employ sophisticated phishing tactics under the guise of job interviews, exploiting platforms…
LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware
LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome extensions, which can manipulate emails, track browsing, and even transform infected browsers into proxies for attackers, enabling them to browse the web with the victim’s credentials.…
Hackers Using AWS Tools To Exploit Compromised Credentials
Security researchers have observed consistent activity from a threat actor dubbed “EC2 Grouper,” which is responsible for numerous cloud compromises and exhibits a distinct modus operandi. EC2 Grouper consistently employs specific user agents and adheres to a unique security group…
ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands
In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several of its router models. These flaws, tracked as CVE-2024-12912 and CVE-2024-13062, pose severe risks by allowing attackers to execute arbitrary commands on compromised devices. ASUS has advised users to…
Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit
Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit alleging that its Siri voice assistant infringed on users’ privacy by recording private conversations without their consent. The preliminary settlement, filed in federal court in Oakland,…
NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours
NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive disruption on January 2, 2025, after a Distributed Denial of Service (DDoS) attack targeted its network infrastructure. The attack resulted in widespread service irregularities affecting customers…
iTerm2 Emulator Vulnerability Let Attackers Access Sensitive User Data
A critical vulnerability discovered in the popular macOS terminal emulator iTerm2 has raised concerns among cybersecurity experts and software users. The flaw, which could allow malicious attackers to access sensitive user data, underscores the importance of timely updates and vigilant…
New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings
PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via phishing emails and SEO poisoning of bundled applications, enabling keylogging, screen capture, and other malicious remote access capabilities. A phishing campaign employed a .jpg file as…
PoC Exploit Released For Critical Windows LDAP RCE Vulnerability
The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers, as a zero-click exploit leverages this by crafting malicious LDAP requests, which, sent without any user interaction, exploit a memory corruption vulnerability within the LDAP service. …
Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys
A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11 (version 24H2) by extracting full volume encryption keys (FVEK) from memory. Using a custom-built tool named Memory-Dump-UEFI, the researcher was able to retrieve sensitive cryptographic keys to…
Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA
The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor authentication (2FA). It provides a service that simplifies the process for attackers. and offers an intuitive interface, allowing for the…