Tag: GBHackers – Latest Cyber Security News | Hacker News

China to Restrict Export of Chipmaking Materials

China has declared that it is going to control the exports of several metals used in the semiconductor sector, including goods made of gallium and germanium. The announcement follows Washington’s attempts to restrict Chinese access to select advanced microprocessors. China’s…

Hackers use Malicious QR Codes to Retrieve Employee Credentials

Hackers use Malicious QR Codes to Retrieve Employee Credentials. Sophisticated technology has been overwritten by simple technologies like QR replacing Barcodes. QR (Quick Response) has been playing a major role in the current generation, which provides the response within a…

ChatGPT and Cybersecurity: Top 5 Cyber Security Risks of ChatGPT

ChatGPT has been met with skepticism and optimism in equal measures in the cybersecurity realm. IT professionals leverage this chatbot to write firewall rules, detect threats, develop custom codes, test software and vulnerability, and more.  This has another implication, too…

Burp Suite New GraphQL API to Detect Hidden Endpoints

The Burp Scanner’s new GraphQL capabilities allow it to recognize known endpoints, locate hidden endpoints, determine whether introspection or recommendations are enabled, and report when an endpoint fails to validate the content type. Portswigger, the firm behind the renowned web…

How to Boost Cybersecurity in Your E-commerce Business

Being a business owner has unquestionably many perks. However, there are plenty of hazards as well. Criminals often target businesses of all sizes and types worldwide, posing a constant problem. Because of the important and sensitive data they manage, e-commerce…

Hackers use Cloned pages of Popular Tools to Deliver Blackcat Ransomware

The cybersecurity researchers at Trend Micro recently identified that the Blackcat Ransomware (aka ALPHV) actors are using malvertising tricks to spread fake WinSCP installers via Targeted Attack Detection (TAD) service. In these advertising campaigns, the threat actors lured their victims…

ChatGPT Creator Sued for $3 Billion Over Theft of Private Data

In a class action complaint filed on Wednesday, it is claimed that OpenAI and Microsoft stole “vast amounts of private information” from internet users without their permission to train ChatGPT. The case seeks $3 billion in damages. There is currently…

Thousands of Individuals Were Rescued from Cybercrime Groups

Around 2700 people were rescued in Manila who were involved in Human Trafficking for fraudulent online gaming sites and other cybercrime groups. The latest news regarding nighttime rides shows Las Pinas City in metropolitan Manila has become the Hubspot for…

Snappy – A New Tool to Detect Fake WiFi Access Points

A new tool named “Snappy” developed by cybersecurity experts, can assist in identifying rogue WiFi access points that aim to steal data from users who are unaware. Tom Neaves, a security researcher with Trustwave and an enthusiast of wireless and…

Submarine Cable Growing Popularity Intensifying Cyber Attacks

Submarine cables installed on the ocean floor facilitate the transmission of data and voice between land-based stations. International communication has relied on submarine cables since the first one was laid across the English Channel in 1850. This cable was used…

Decrypter Released for the Notorious Akira Ransomware

Akira ransomware appeared in 2017 when it encrypted video folders without leaving any ransom notes. The file encrypted by Akira ransomware has an extension of .akira. Researchers have been working on decrypting the files affected by the ransomware and finally…

MITRE Releases Top 25 Most Dangerous Software Weaknesses

The top 25 most dangerous software weaknesses impacting software for the previous two calendar years have been published by MITRE as part of the 2023 Common Weaknesses Enumeration (CWE). Attackers can utilize these flaws to seize control of a vulnerable…

Charming Kitten APT Group Uses Innovative Spear-phishing Methods

Charming Kitten APT Group Uses Innovative Spear-phishing Methods. Volexity researchers recently noticed that threat actors are actively intensifying their efforts to compromise the credentials or systems of their targets by employing Spear-phishing Methods.  While spear-phishing techniques involve sending personalized messages…

ThirdEye – A new Infostealer Malware Steal BIOS & Hardware Data

Cybersecurity researchers at FortiGuard Labs recently found an unseen infostealer dubbed “ThirdEye” that is mainly crafted to steal several information from the systems that are compromised. While the stolen data and information that are gathered by this infostealer are used…

Honeywell Server Compromised by MOVEit Hackers

A flaw was discovered in Progress MOVEit Transfer, a popular third-party online transfer application. By exploiting the flaw, attackers compromised multiple organizations, including U.S. Government agencies. Honeywell is the recent victim of MOVEit Hackers as they gained Unauthorized access to…

Akira Ransomware Expanded its Toolkit to Attack Linux Machines

A newly emerged ransomware known as Akira expands its operations to target Linux-based platforms which add the “.akira” file extension to each compromised file.  Akira ransomware mostly operating since April 2023, and actively targeting numerous organizations, compromising their sensitive data. …

Flipper Hacking Device Gained Popularity Among Users

The Flipper Zero hacking device plans on selling $80 million worth of gadgets this year, up from preorders on Kickstarter that totaled over $5 million. It also claims to have sold $25 million of the devices last year. The business, established…

Most Enterprise SIEMs Fail Against MITRE ATT&CK Tactics

SIEM (Security Incident and Event Management) tools are being used in most organizations for monitoring, analyzing, and preventing threat actors. Organizations are trying to build more and more in terms of security to protect against ransomware attacks, data breaches, and…

Cisco AsyncOS Software Flaw Let Remote Hackers Launch XSS Attack

Cisco AsyncOS Software, used by Cisco Secure Email and Web Manager, Cisco Secure Email Gateway (previously Cisco Email Security Appliance; ESA), and Cisco Secure Web Appliance (WSA), has multiple flaws in its web-based management interface. The vulnerabilities could allow a…

Zyxel Command Injection Vulnerability Let Attackers Execute OS Commands

Zyxel has been one of the world’s leading networking products manufacturing companies and one of the top companies in the telecommunications industry.  The company has customers worldwide, including the United States, the United Kingdom, France, and India. Zyxel NAS (Network-Attached…

Anatsa Malware Spotted on Google Play Attack Banking Customers

A fresh ongoing campaign spreads the Android banking Trojan known as Anatsa. New institutions in the United States, the United Kingdom, and German-speaking countries were hit by this wave of Anatsa malware. Threat actors intend to steal credentials by authorizing customers…

Chrome Security Update – 4 High-Severity Vulnerabilities Patched

Chrome Security Update – 4 High-Severity Vulnerabilities Patched. For Mac, Linux, and Windows, the Stable and Extended Stable channels have been upgraded to 114.0.5735.198/114.0.5735.198/199, respectively.  This update will be rolling out over the next few days/weeks. With three issues that…

Pilot Logins of American and Southwest Airlines Stolen in Data Breach

American Airlines and Southwest Airlines, two significant US-based aviation companies, have announced data breaches that have impacted their Pilot Credentials. Pilot Credentials, a third party, manages various airlines’ pilot application and recruiting websites, including Southwest Airlines. The Pilot Credentials issue,…

Infamous Twitter Hacker Sentenced to 5 Years in Prison

Joseph James O’Connor, 24, a UK citizen, was responsible for one of the biggest social media hacks in 2020, where Twitter accounts of several celebrities and verified accounts were hacked for posting about a “double your cryptocurrency” scam. O’Connor was…

CISOs are More Concerned with Lawsuits, and API Security (Survey Report)

Digital initiatives play a crucial role in business today; they bring new business opportunities, fostered creative partnerships, and deliver new customer conveniences across multiple industries. But all these innovations pose the biggest challenges for CISOs/CSOs, and they don’t want companies…

Web Application Security: A 2023 Guide

Web application security refers to the measures taken to safeguard web applications from potential attacks. It involves strategies and processes to secure web applications from external threats that could compromise their functionality, safety, and data integrity. An effective web application…

Founder of the World’s Largest Hacker Forums Arrested

The founder of BreachForums made his first court appearance in the Eastern District of Virginia over a criminal complaint arising from his alleged creation and oversight of a prominent hacking forum and illicit marketplace for cybercriminals. More than 340,000 individuals claimed to…

New JavaScript-based Dropper Delivers Bumblebee and IcedID Malware

The latest research unveiled the JavaScript-based droppers, which deliver Bumblebee and IcedID malware instead of PowerShell-based droppers. These two malware types are significantly related to ransomware attacks.  Bumblebee is a modular loader, distributed primarily through phishing, used to deliver payloads…

Amazon Sued For Tricking Users to Get Prime Subscriptions

In the most extreme action taken against the firm by the agency’s chair, Lina Khan, the Federal Trade Commission filed a lawsuit against Amazon on Wednesday, accusing it of illegally pressuring customers to subscribe to its Prime membership and making…

NSA Releases Guide to Combat BlackLotus Malware

Malicious cyber actors might exploit a known flaw in Microsoft Windows’ secure startup process to bypass Secure Boot protection and run the BlackLotus malware. BlackLotus uses a known flaw dubbed “Baton Drop,” tracked as CVE-2022-21894, to bypass beyond security precautions made by the…

Millions of GitHub Repositories Are Vulnerable To RepoJacking

An attack called RepoJacking may potentially affect millions of GitHub repositories. If abused, this vulnerability might result in code execution on the internal networks of organizations or on the networks of their customers.  This includes the repositories of companies like…

Microsoft Warns of Stealthy Password Attacks Using Proxy Services

The threat actor “Midnight Blizzard” is engaging in increasing credential attack activity. They conceal the origin of their assaults by employing residential proxy services. These attacks target governments, IT service providers, NGOs, the defense sector, and vital manufacturing. Numerous password…

Can ChatGPT Detect Phishing Sites? – Researchers Answered

The subject of whether ChatGPT can be used to create phishing sites and if it can also be used to detect them accurately has been discussed by security researchers. This experiment has been conducted to see how much cybersecurity information…

Can ChatGPT Detect Phishing Sites? Researchers Answered

The subject of whether ChatGPT can be used to create phishing sites and if it can also be used to accurately detect them has been discussed by security researchers. This experiment has been carried out to see how much cybersecurity…

API Security Testing: Importance, Risks, and Test Cases

In the ever-evolving landscape of system connectivity, APIs have transformed how information is shared and utilized. However, their widespread adoption has introduced security risks that cannot be ignored.  LinkedIn’s data breach, where approximately 92% of data was exposed due to…

Hackers Attack Linux SSH Servers with Tsunami DDoS Malware

Hackers Attack Linux SSH Servers. An attack campaign has been recently uncovered by AhnLab ASEC, where poorly controlled Linux SSH servers are targeted and infiltrated with the Tsunami DDoS Bot. In addition to Tsunami, the threat actor installed several other…

Megaupload Developers Plead Guilty to Avoid US Extradition

Recently, the High Court in Auckland sentenced the Megaupload programmers to jail after they admitted guilt and agreed to provide testimony against Kim Dotcom. The two men overseeing the site ‘Megaupload’ received individual prison terms exceeding two years. Here below,…

Sign in to Leak Your Credentials – Attackers Abusing Legitimate Services

An ongoing phishing campaign has found that attackers abuse legitimate credential harvesting services and data exfiltration to avoid detection. With 59% of assaults recorded, credential harvesting has consistently been the most common attack vector. It contributes significantly to business email compromise…

Android GravityRAT Spyware Steals WhatsApp Backup Files

Since August 2022, a recently discovered Android virus named “GravityRAT” has rapidly circulated through a new Android malware campaign.  It gains access to phones by disguising itself as a fraudulent chat app called ‘BingeChat‘ in order to steal users’ sensitive…

Cloud Penetration Testing Checklist – 2023

Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code. Cloud computing is the shared responsibility of the Cloud provider and the client who earn the service from…

Hackers Use New Exploit Technique to Hijack S3 Buckets

It has been discovered that threat actors might take over expired Amazon S3 buckets to serve rogue binaries without changing the actual modules. Malicious binaries exfiltrate the stolen data to the hacked bucket after stealing the user names, passwords, local machine…

US Government Hit By Clop In MOVEit Global Cyberattack

A global cyberattack targeting numerous US federal government institutions has been launched as a result of the recent revelation of vulnerabilities in the MOVEit Transfer and MOVEit Cloud platforms. According to reports, the claimed responsible ransomware group, Clop, is known to…

Hackers Set Up Fake GitHub Repos to Deliver Malware Posing as Zero-day

Recently, the cybersecurity researchers at VulnCheck identified a growing trend of hackers masquerading as cybersecurity researchers on social platforms like Twitter and GitHub.  While hackers are doing so to spread fake proof-of-concept exploits for the vulnerabilities that are Zero-day in…

New EMFI Attack Against Drones Leads to Complete Take Over

Based on the recent reports by IOActive, Drones, also called Unmanned Aerial Vehicles (UAVs), are vulnerable to code injection, which would result in gaining complete access to the firmware and core functionality of the drone. Drones have been used in…

Massive Phishing Campaign Uses 6,000 Sites to Mimic Popular Brands

Bolster’s threat research team recently discovered an extensive brand impersonation effort targeting more than 100 well-known clothes, footwear, and apparel firms. The peak phishing activity for this campaign occurred between November 2022 and February 2023, after becoming active around June…

University of Manchester Cyber Attack – Hackers Stolen Sensitive Data

An alarming cyberattack has hit the University of Manchester, and the University confirmed this incident officially on June 9, 2023. This unfortunate event likely resulted in threat actors’ unauthorized access, raising concerns about potential data exposure. The University of Manchester…

Super Smash Flash 2 Unblocked – Let’s Play – 2023

Super Smash Flash 2 Unblocked is the next fun version of the impressive game series which is titled Super Smash Bros. Super Smash Flash 2 was designed by McLeodGaming operator. The release of the game was as brilliant as its…

100+ Best Ethical Hacking & Pentesting Tools – 2023

Penetration testing & Hacking Tools are more often used by security industries to test the vulnerabilities in networks and applications. Here you can find the Comprehensive Penetration Testing & Hacking Tools list that covers Performing Penetration testing Operations in all…

Beyond Passwords: The Future of Authentication in Cybersecurity

The digital counterpart of your physical reality is growing phenomenally. While positive outcomes are certainly there, with the growth of the internet, the risks associated with it are also growing rapidly. When discussing cybersecurity risk management, the first thing that…

Honda eCommerce Platform Flaw Exposes Customers’ Data

Eaton Zveare, a security researcher, has released the specifics of major vulnerabilities uncovered in Honda’s e-commerce platform for power equipment, marine, and lawn & garden products. It allowed anyone to reset their password for any account and was therefore open…

Cyber Criminals Sharing GPT-4 API Keys for Free

Recently, a script kiddie has been banned for sharing the stolen OpenAI API keys with many users on Discord for the r/ChatGPT subreddit. Developers can seamlessly incorporate OpenAI’s language model, GPT-4, into their applications using API keys. Oftentimes, developers unintentionally…

Burp Suite 2023.6 Released – What’s New!

PortSwigger released a brand-new version of Burp Suite 2023.6 that is intended for both Professional and Community users. BChecks, a new type of custom scan check, are introduced in this release. Additionally, it includes GraphQL scan checks, enhancements to Burp…

Over 60,000 Android Apps Silently Install Malware on Devices

Recently, cybersecurity researchers uncovered that over 60,000 Android applications had been stealthily disguised as genuine software for the past six months. It has been identified that these malicious apps have been secretly implanting adware onto unsuspecting mobile devices without detection.…

Moonlighter – World’s First and Only Satellite-Hacking Sandbox

Moonlighter, a groundbreaking project dubbed the “first-ever hacking sandbox in space,” will revolutionize satellite hacking as it ventures into low-Earth orbit in August.  This pioneering effort promises to push the boundaries of cybersecurity by providing a unique platform for hacking…

ChatGPT Cybersecurity Grant Program – $1M to Boost AI Capabilities

OpenAI, supported by Microsoft, recently unveiled an innovative cybersecurity grant initiative to enhance AI-driven cybersecurity measures. The creators of ChatGPT are actively engaged in enhancing cybersecurity evaluations for AI models, aiming to measure and enhance their efficacy.  They are dedicated…