GB Hacker
-
PoetRAT: Malware Targeting Public and Private Sector Using Malicious Microsoft Word Documents
Security researchers observed multiple new campaigns with modified PoetRAT targeting various public and private sector in Azerbaijan. The threat...
-
CISA Warns of Emotet Malware Attacks Targeting Government Entities Via Weaponized Word Documents
CISA observes a significant increase in Emotet malware attacks that steals login credentials from various browsers, email clients, and...
-
Hackers Abuse Windows Error Reporting (WER) Service in Fileless Malware Attack
Security researchers uncovered a new attack dubbed Kraken that uses injected its payload into the Windows Error Reporting service to evade...
-
Flaws in Popular Antivirus Softwares Let Attackers to Escalate Privileges
Security researchers from CyberARK discovered security bugs with anti-malware software that allows attackers to escalate privileges on an...
-
A New Mirai based IoT RAT Spreading Through 2 0-day Vulnerabilities
Netlab observed a new IoT botnet exploits two Tenda router 0-day vulnerabilities to install a Remote Access Trojan (RAT). The botnet dubbed...
-
Complete CompTIA Certification Training Bundle 2020 – CompTIA Security +, Pentest+, CySA+ With Lifetime Access
CompTIA is a global provider of vendor-neutral IT certifications, Most, if not all, CompTIA Certification Training are Teach you the best IT...
-
New Ransomware that Threatens Companies to Pay Ransom Within 3 days Else they Leak Data
The threat actor group behind new ransomware dubbed “Egregor” targets companies to steal sensitive data and then encrypt all the files....
-
SilentFade – A Malware Family that Used Facebook ad Platform to Attack Users
Every malware needs a medium to spread the infection, SilentFade malware abuses the Facebook ads platform to attack users for ad fraud, sales of...
-
GitHub Launches Code Scanning Tool to Find Security Vulnerabilities – Available for All Users
GitHub launches a new code scanning tool that helps developers to detect vulnerability before the application reaches production. The tool was...
-
APT‑C‑23 Hacker Group Attacks Android Users That Records Calls & Take Pictures Silently
Security researchers discovered new spyware used by the APT-C-23 threat group to target Android users through fake Android app store. The...
-
Joker Malware Targets Android Users to steal SMS Messages and Contact Lists – 17 Apps Removed from Google Play
Joker is one of the most prominent malware families that continuously target the Android devices, it’s main activity is to stimulate clicks on...
-
Certified Malware Analyst – Exploit Development, Expert Malware Analysis & Reverse Engineering
Certified Malware Analyst: In 2020, sophisticated Cyber attacks keep on increasing by APT threats that target most of the enterprise-level...