Tag: GBHackers On Security

Beware! Hackers Attack AWS EC2 Workloads to Steal Credentials

Cybersecurity experts at Trend Micro have recently identified that hackers are actively attacking the Amazon Web Services (AWS) EC2 workloads to steal credentials. By exploiting this tool, hackers get the ability to exfiltrate essential data like access keys and tokens. …

Wireshark 4.0.1 Released – What’s New!!

A new version of Wireshark has been released recently by the Wireshark Team, it’s Wireshark 4.0.1, which contains several enhancements, new updates, and bug fixes. Wireshark is one of the most widely used open-source free software packet analyzers that are…

Hackers Exploit Critical VMware Flaw to Drop Ransomware & Miners

Researchers at FortiGuard Labs noticed multiple malware campaigns targeting the VMware vulnerability to deploy cryptocurrency miners and ransomware on affected machines. The critical vulnerability is tracked as CVE-2022-22954 (CVSS score: 9.8), a remote code execution vulnerability that causes server-side template…

Hackers Exploit Critical VMware Flaw to Drop Ransomware & Miners

Researchers at FortiGuard Labs noticed multiple malware campaigns targeting the VMware vulnerability to deploy cryptocurrency miners and ransomware on affected machines. The critical vulnerability is tracked as CVE-2022-22954 (CVSS score: 9.8), a remote code execution vulnerability that causes server-side template…

Protecting Your Cloud Environments With Zero Trust

When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the cloud from the inside out using the principle of least privilege to grant secure access to any company resource. Eliminating…

Verizon Cyberattack – Prepaid Customers Data Exposed

Verizon notified its prepaid customers of the recent cyberattack that threat actors gained access to Verizon accounts and used exposed credit card information. The company says during regular account monitoring, they were able to notice an abnormal activity on the…

Protecting Your Cloud Environments With Zero Trust

When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the cloud from the inside out using the principle of least privilege to grant secure access to any company resource. Eliminating…

Verizon Cyberattack – Prepaid Customers Data Exposed

Verizon notified its prepaid customers of the recent cyberattack that threat actors gained access to Verizon accounts and used exposed credit card information. The company says during regular account monitoring, they were able to notice an abnormal activity on the…

Over 900 Servers Hacked Using a Critical Zimbra Zero-day Flaw

The cybersecurity company Kaspersky detected almost 900 servers being compromised by sophisticated attackers leveraging the critical Zimbra Collaboration Suite (ZCS), which at the time was a zero-day without a patch for nearly 1.5 months. “We investigated the threat and was…

Protecting Your Cloud Environments With Zero Trust

When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the cloud from the inside out using the principle of least privilege to grant secure access to any company resource. Eliminating…

Verizon Cyberattack – Prepaid Customers Data Exposed

Verizon notified its prepaid customers of the recent cyberattack that threat actors gained access to Verizon accounts and used exposed credit card information. The company says during regular account monitoring, they were able to notice an abnormal activity on the…

Over 900 Servers Hacked Using a Critical Zimbra Zero-day Flaw

The cybersecurity company Kaspersky detected almost 900 servers being compromised by sophisticated attackers leveraging the critical Zimbra Collaboration Suite (ZCS), which at the time was a zero-day without a patch for nearly 1.5 months. “We investigated the threat and was…

Fortinet Auth Bypass Bug Exploited in Wild for Attacks

A critical vulnerability has been identified recently in FortiGate firewalls and FortiProxy Web Proxy. While FortiGate has already alerted its customers about the issue.  If an attacker is able to successfully exploit this critical vulnerability, they would potentially be able…

Fortinet Auth Bypass Bug Exploited in Wild for Attacks

A critical vulnerability has been identified recently in FortiGate firewalls and FortiProxy Web Proxy. While FortiGate has already alerted its customers about the issue.  If an attacker is able to successfully exploit this critical vulnerability, they would potentially be able…

Fortinet Auth Bypass Bug Exploited in Wild for Attacks

A critical vulnerability has been identified recently in FortiGate firewalls and FortiProxy Web Proxy. While FortiGate has already alerted its customers about the issue.  If an attacker is able to successfully exploit this critical vulnerability, they would potentially be able…

Top Cybersecurity Threats for Public Sector

In the private sector, hackers and cybercriminals are prone to leaving organizations with good security infrastructures alone. Because they often go after low-hanging fruit, hacking into a well-protected network is perceived as more trouble than it’s worth. But the public…

WireShark 4.0.0 Released – What’s New!!

There are several open-source packet analyzers available, but Wireshark is among the most popular. Moreover, the application has been upgraded to version 4.0.0 and comes with multiple new features and fixes. It is not only network administrators who use Wireshark…