GB Hacker
-
Alert! 333% Surge in Hunter-Killer Malware that Bypasses Network Security Controls
Hunter-Killer is a sophisticated type of malware primarily designed to actively seek out and neutralize other malware present on a system....
-
Turk Hack Team Attacked the World’s Largest Cooperative Finance
Threat actors target financial institutions due to the potential for significant financial gains and access to sensitive customer data. These...
-
New Android MoqHao Malware Executes Automatically on Installation
The Roaming Mantis threat group distributes a well-known Android malware family called “MoqHao.” This malware family has been previously...
-
Researchers Use Raspberry Pi Pico to Crack BitLocker Under a Minute
BitLocker is a computer program provided by Microsoft that users can use to encrypt their entire volumes, preventing unauthorized access in case...
-
Beware of Facebook Ads That Deliver Password-Stealing Malware
A new malware called Ov3r_Stealer was found to be intended for stealing cryptocurrency wallets and passwords and then sending them to a Telegram...
-
Why and How to Extract Malware Configurations in a Sandbox
Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source of...
-
Mispadu Malware Exploits Windows SmartScreen Flaw to Attack Users
A new variant of Mispadu stealer has been identified by researchers, which specifically targets victims in Mexico. This variant of Mispadu stealer...
-
ApateWeb: Hackers Using 130,000+ Domains to Launch Cyber Attacks
A new large-scale campaign named “ApateWeb ” has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted...
-
ANY.RUN Sandbox Now Let SOC & DFIR Teams Analyze Sophisticated Linux Malware
The ANY.RUN sandbox has now been updated with support for Linux, further enhancing its ability to provide an isolated and secure environment for...
-
What is Email Hijacking? – Email Account Takeover Protection Guide – 2024
Email hijacking occurs when cybercriminals gain unauthorized access to an individual’s or organization’s email account, it continues to pose a...
-
“45K+ Exposed Jenkins Instances Vulnerable to RCE Attacks”
It was previously reported that Jenkins was discovered with a new critical vulnerability, which was associated with unauthenticated arbitrary file...
-
Control D Launches Control D for Organizations: Democratizing Cybersecurity for Organizations of All Sizes
In an era where online threats no longer discriminate by business size, Control D , powered by Windscribe VPN ‘s robust security expertise,...