GB Hacker
-
Swiggy Account Hacked, Hackers Placed Orders Worth Rs 97,000
In a startling incident underscoring the growing menace of cybercrime, a woman’s Swiggy account was hacked, leading to fraudulent orders worth Rs...
-
VMware Urges to Remove Enhanced EAP Plugin to Stop Auth & Session Hijack Attacks
VMware has issued an urgent advisory to administrators to remove a deprecated authentication plugin vulnerable to severe security threats....
-
Hackers Arrested For Stealing Banking Credentials Using Android Malware
An individual residing in Vinnytsia, aged 31, has been apprehended for purportedly pilfering confidential data of Android users and exploiting...
-
First Ever iOS Trojan Steals Facial Recognition Data
A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition...
-
New Outlook 0-day RCE Flaw Exploited in the Wild
Outlook has been discovered to have an interesting vulnerability while handling specific hyperlinks, which was found to be exploited by threat...
-
New HijackLoader Malware Uses Advanced Techniques to Avoid Detection
Threat actors exploit HijackLoader because it is a powerful tool for injecting malicious code into legitimate processes, enabling stealthy...
-
Alert! 333% Surge in Hunter-Killer Malware that Bypasses Network Security Controls
Hunter-Killer is a sophisticated type of malware primarily designed to actively seek out and neutralize other malware present on a system....
-
Turk Hack Team Attacked the World’s Largest Cooperative Finance
Threat actors target financial institutions due to the potential for significant financial gains and access to sensitive customer data. These...
-
New Android MoqHao Malware Executes Automatically on Installation
The Roaming Mantis threat group distributes a well-known Android malware family called “MoqHao.” This malware family has been previously...
-
Researchers Use Raspberry Pi Pico to Crack BitLocker Under a Minute
BitLocker is a computer program provided by Microsoft that users can use to encrypt their entire volumes, preventing unauthorized access in case...
-
Beware of Facebook Ads That Deliver Password-Stealing Malware
A new malware called Ov3r_Stealer was found to be intended for stealing cryptocurrency wallets and passwords and then sending them to a Telegram...
-
Why and How to Extract Malware Configurations in a Sandbox
Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source of...