GB Hacker
-
New Android MoqHao Malware Executes Automatically on Installation
The Roaming Mantis threat group distributes a well-known Android malware family called “MoqHao.” This malware family has been previously...
-
Researchers Use Raspberry Pi Pico to Crack BitLocker Under a Minute
BitLocker is a computer program provided by Microsoft that users can use to encrypt their entire volumes, preventing unauthorized access in case...
-
Beware of Facebook Ads That Deliver Password-Stealing Malware
A new malware called Ov3r_Stealer was found to be intended for stealing cryptocurrency wallets and passwords and then sending them to a Telegram...
-
Why and How to Extract Malware Configurations in a Sandbox
Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source of...
-
Mispadu Malware Exploits Windows SmartScreen Flaw to Attack Users
A new variant of Mispadu stealer has been identified by researchers, which specifically targets victims in Mexico. This variant of Mispadu stealer...
-
ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks
A new large-scale campaign named “ApateWeb ” has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted...
-
ANY.RUN Sandbox Now Let SOC & DFIR Teams Analyze Sophisticated Linux Malware
The ANY.RUN sandbox has now been updated with support for Linux, further enhancing its ability to provide an isolated and secure environment for...
-
What is Email Hijacking? – Email Account Takeover Protection Guide – 2024
Email hijacking occurs when cybercriminals gain unauthorized access to an individual’s or organization’s email account, it continues to pose a...
-
“45K+ Exposed Jenkins Instances Vulnerable to RCE Attacks”
It was previously reported that Jenkins was discovered with a new critical vulnerability, which was associated with unauthenticated arbitrary file...
-
Control D Launches Control D for Organizations: Democratizing Cybersecurity for Organizations of All Sizes
In an era where online threats no longer discriminate by business size, Control D , powered by Windscribe VPN ‘s robust security expertise,...
-
Russian TrickBot Malware Developer Pleaded Guilty
Vladimir Dunaev, a resident of Amur Blast and aged 40, has confessed to creating and distributing Trickbot malware. The purpose of the malware was...
-
Pure Malware Tools Pose As Legitimate Software to Bypass AV Detections
An extensive examination of the growing danger posed by the Pure malware family has been released, providing the industry with more insightful...