Tag: GBHackers – Latest Cyber Security News | Hacker News

PoC Exploit Code Released for Critical Papercut Flaw

Threat actors are actively taking advantage of critical vulnerabilities present in the PaperCut MF/NG print management software.  This exploitation aims to plant Atera remote management software onto the targeted servers to gain control over them. From more than 70,000 companies…

Microsoft Changed the Method of Naming the Hacker Groups

Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to confusion about which threat actor was responsible for which threat activity. To solve this, Microsoft has introduced this naming taxonomy…

Russian APT28 Group Exploiting Vulnerabilities in Cisco Routers

A recent report from CISA (US Cybersecurity and Infrastructure Security Agency)  revealed that the APT 28 group was responsible for exploiting Cisco routers with poor maintenance using CVE-2017-6742.  CVE-2017-6742 Attack:  Reconnaissance with RCE in Cisco SNMP (Simple Network Management Protocol)…

Hackers Using Old Nokia 3310 Phone to Start Car Without Key

Recent car thefts have involved technology concealed inside outdated Nokia phones and Bluetooth speakers. This brand-new type of car theft is becoming more prevalent in the US. Criminals use tiny gadgets to interface with the car’s control system, sometimes hidden…

Hackers Selling ChatGPT Premium Accounts On the Dark Web

As more stolen ChatGPT Premium accounts are traded, cybercriminals can circumvent OpenAI’s geofencing restrictions and gain unrestricted access to ChatGPT, according to Check Point Research (CPR). One of the most thriving markets in the hacker underworld and on the dark…

What is Insider Attacks? : How Prepared Are You?

Insider attacks often catch organizations by surprise because they’re tricky to spot. Banking on reactive solutions like antivirus software or a patch management solution to avoid such attacks is not wise. Understanding what contributes to the increasing number of insider…

Cybercriminals Selling Python-based Hacking Tool via Telegram

Recently, Cado Security Labs discovered and unveiled details of a new Python-based credential harvester called “Legion.” Cybersecurity researchers have asserted that this hacking tool, “Legion” has already made its way to Telegram and is being actively marketed on Telegram by…

Wireshark 4.0.5 Released With New Protocol Support

With improved protocol support, various bug fixes, and several enhancements, Wireshark has released version 4.0.5. On March 3, 2023, the most recent version of Wireshark 4.0.4 was made available; this is the second upgrade of this year. The open-source packet analyzer…

Kodi Hacked – Attackers Stole the Forum Database

The Kodi Foundation learned that a dump of the Kodi user forum, MyBB software, was being sold on online forums. Kodi is a multi-platform, open-source media player, manager, and streaming suite. It supports a wide range of third-party add-ons, which give users…

The Bot Invasion: Is Your Digital Ad Campaign at Risk?

The rise of digital ad fraud has been a nightmare for businesses and marketers alike. Sophisticated bots can easily imitate human behavior and generate fake clicks, views, and impressions, costing companies millions of dollars in wasted ad spending. Is your…

iPhones Hacked Via iOS Zero-Click Exploit To Deploy Spyware

Microsoft Threat Intelligence experts say a threat group is associated with “QuaDream,” an Israeli-based private sector offensive actor (PSOA).  It employed a zero-click exploit called END OF DAYS to compromise the iPhones of high-risk individuals. Reports say QuaDream sells a…

Hardware Giant MSI Hacked – Ransomware Group Issues Demand

A cyberattack was recently launched on some of the information systems of the multinational Taiwanese technology company Micro-Star International (MSI) Co., Ltd. According to MSI’s statement, the incident was swiftly reported to law enforcement authorities, and recovery efforts have begun.…

Amazon Banned Flipper Zero Pentesting Tool

According to reports, Amazon has stopped selling Flipper Zero, one of the most widely used pentesting tools. Amazon tagged the product as a “card-skimming device” and prohibited its selling on the e-commerce platform.  Flipper Zero was one of the best…

Tor Project Creates New Privacy-Focused Browser using VPN Layer

The Tor browser guarantees that your communication remains operational through a decentralized network of transfers maintained by volunteers located worldwide. It safeguards your internet connection from prying eyes by preventing any individual from monitoring the websites you visit, shields your…

Spyware Vendors Exploit 0-Days On Android and iOS Devices

The Threat Analysis Group (TAG) of Google unveiled recently that commercial spyware vendors targeted Android and iOS devices using zero-day vulnerabilities patched last year. In November 2022, the first campaign was discovered by security analysts targeting iOS and Android users.…

New WiFi Flaw Let Attackers Hijack Network Traffic

A fundamental security issue in the design of the IEEE 802.11 WiFi protocol standard, according to a technical study written by Domien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef of imec-DistriNet, KU Leuven, allows attackers to deceive access points into exposing…

UK Police Setup Thousands of  Fake DDoS-For-Hire Websites

The National Crime Agency (NCA) of the United Kingdom revealed that it had built several fake DDoS-for-hire service websites to track down cybercriminals who use these platforms to attack businesses. Also, this declaration follows the Agency’s decision to designate one of…

Parts of Twitter’s Source Code Leaked Online On GitHub

Recently, Twitter has acknowledged that some of its confidential source code has been exposed on the popular coding platform GitHub. To address this issue, Twitter has sent GitHub a copyright infringement notice. The petition demands GitHub identify the individual who…

Hackers Inject Weaponized JavaScript (JS) on 51,000 Websites

Researchers from Unit 42 have been monitoring a widespread campaign of harmful JavaScript (JS) injections. The campaign aims to redirect unsuspecting victims to dangerous content, including adware and fraudulent pages. Websites continue to be infected by this threat in 2023,…

Malicious ChatGPT Chrome Extension Steal Facebook Accounts

Thousands of Facebook accounts have been stolen due to a trojanized version of the legitimate ChatGPT extension for Google Chrome. The trojanized version of the ChatGPT extension managed to gain popularity with more than 9,000 downloads. Cybercriminals replicated the genuine…

Google to Reduce SSL Certificate Lifespan to 90 Days

Recently, Google declared its plan to reduce the maximum validity for public TLS (SSL) certificates from 398 to 90 days. Under its “Moving Forward, Together” plan, Google intended to limit the maximum public TLS certificate validity to 90 days via…

BFSI Sector at the Forefront of Cyberattacks

In recent years, the BFSI Sector (Banking, Financial Services, and Insurance) has become a primary target for cyber attackers. A 2022 report by IBM revealed that the average cost of a data breach in the financial industry reached a staggering…

OpenAI Announces GPT-4, the Successor of ChatGPT

A powerful new AI model called GPT-4 has been released recently by OpenAI, which is capable of comprehending images and texts. The company describes this as the next-stage milestone in its effort to scale up deep learning. In November 2022,…

Data Security With Cloud Compliance: Meeting Regulations & Standards

Businesses from all industries are aware of the benefits of cloud computing. Some organizations are just getting started with migration as part of digital transformation initiatives, while others are implementing sophisticated multi-cloud, hybrid strategies. However, data security in cloud computing…