GB Hacker
-
Cisco Was Hacked by Yanluowang Ransomware Operators to Stole Internal Data
Recent reports indicate that in late May Cisco’s corporate network was infected with ransomware from the Yanluowang group. Under the threat of...
-
Global Scam-as-a-service Operation “Classiscam” Target Users to Steal Payment Data
The cybersecurity firm Group-IB, one of the world’s most prominent companies, has identified Classiscam as a potential threat. This recent wave...
-
Hackers Use Open Redirect Vulnerabilities in Online Services to Deliver Phishing Content
Researchers at Resecurity noticed threat actors leveraging Open Redirect Vulnerabilities which is popular in online services and apps to evade...
-
Kali Linux 2022.3 Released – What’s New !
Kali Linux 2022.3 was released recently, which contains new tools for hacking that were never before available. All the updates in this release...
-
Chinese APT Hackers Target Govt & Defense Orgs Using New Windows Malware
In January, a series of attacks using new Windows malware was detected using several countries in Eastern Europe to backdoor entities in the...
-
Beware of New Malware that Distributed through Compromised YouTube Accounts
Cyble Research Labs (CRL) specifies that the stealers such as PennyWise and RedLine are increasing and spreading through YouTube campaigns. In...
-
Masscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 Minutes
Masscan – Worlds fastest scanner can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second. Masscan is an...
-
Stegomalware Surge – Attackers Using File, Video, Image & Others To Hide Malware
A surge in the number of Stegomalware instances using Steganography has been reported recently by the cybersecurity experts at Cyble Research...
-
Hackers Exploiting High-Severity Zimbra Flaw to Steal Email Account Credentials
Zimbra CVE-2022-27824 has been added to the CISA’s “Known Exploited Vulnerabilities” catalog as a new vulnerability. Hackers are actively...
-
Hackers Exploited Twitter Zero-day Bug to Expose 5.4 Million Accounts
Over 5.4 million Twitter user accounts a threat actor compiled profiles in order to create a list of the accounts. Using this ID, the threat...
-
Dark Utilities – A C2aaS Platform Leveraged By Hackers To Implant Malware
Dark Utilities is a new service that has been discovered recently by security researchers at Cisco Talos. In order to set up a C2 center for...
-
VirusTotal Reveals List of Most Mimicked Legitimate Apps in Malware Attacks
The cybersecurity analysts at VirusTotal recently discovered that an increasing number of threats are being used to mask legitimate applications...