GB Hacker
-
Iranian state-sponsored Actors Exploiting Log4j 2 Flaws in Unpatched Systems
As far as exploiting unpatched Log4j systems to target Israeli entities are concerned, the Iranian state-sponsored threat actors leave no stone...
-
Threat Actors Moving to Sliver Command-and-Control (C2) to Evade Detection
In favor of similar frameworks less familiar to threat actors, threat actors are ditching Cobalt Strike penetration testing. There has been a...
-
LastPass Developer Account Hacked to Steal the Company’s Source Code
LastPass, a freemium password management company was hacked which allows an unauthorized party gain access and steal portions of source code and...
-
ETHERLED – A New Attack Method to Exfiltrate Data from Air-Gapped Devices using LED Indicators
A researcher from Israel, Mordechai Guri, has concluded that he has discovered the possibility of exfiltrating data from air-gapped systems...
-
VMware Flaw Let Attackers Escalate Privilege in VMware Tools Suite
Cloud computing company, VMware addresses local privilege escalation vulnerability in the VMware Tools suite of utilities that impacts both...
-
Google Uncovered Tool used by Iranian APT Hackers to Steal Email Data
There has been an addition to the Iranian APR group Charming Kitten’s malware arsenal recently with the addition of a new malicious tool. This...
-
How Can WAF Prevent OWASP Top 10?
The OWASP Top 10 security risks point out the common vulnerabilities seen in web applications. But it does not list the set of attack vectors...
-
Grandoreiro Banking Trojan Targeting Automotive, Chemicals Manufacturing Industries
The Grandoreiro is a banking trojan that has been identified recently by the security analysts at Zscalerin in recent attacks, and threat actors...
-
Malware in Counterfeit Android Device Attack on WhatsApp and WhatsApp Business
Researchers from Doctor Web identified backdoors in the system partition of budget Android device models which targets WhatsApp and WhatsApp...
-
Hackers Exploited a Zero-day Flaw in Bitcoin ATM Servers to Steal Cryptocurrency
General Bytes Bitcoin ATM servers have been exploited by hackers in order to steal cryptocurrency from their customers as a result of a zero-day...
-
Hackers Attack Hotel & Travel Organizations to Steal Sensitive Data
Hackers classified as TA558 have been increasing their activities since the beginning of this year. There has been an increase in the number of...
-
Russian APT Group Attack Microsoft 365 users Abusing Azure Services
There has been a surge in cyberespionage attacks levied by Cozy Bear (aka APT29 and Nobelium), a Russian cyberespionage group backed by the...