GB Hacker
-
Beware of Weaponized Office Documents that Deliver VenomRAT
Since office documents are often used in business communications, hackers take advantage of this fact to disseminate malicious malware easily....
-
SSH3 – Faster & Rich Secure Shell Using HTTP/3
SSH or Secure Shell is a cryptographic network protocol that enables secure communication and remote access over an unsecured network. This...
-
Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions
Memcyco will showcase its solutions at Deloitte’s annual Cyber iCON event, demonstrating how organizations can build effective defenses to...
-
Beware of Pirated MacOS Apps That Install Chinese Malware
Similar to ZuRu malware, a new malware has been found embedded in pirated macOS applications, which downloads and executes several payloads to...
-
New Outlook Flaw Let Attackers Access Hashed Passwords
A new Outlook vulnerability that can be used to extract NTLMv2 hashes by exploiting Outlook, Windows Performance Analyzer (WPA), and Windows File...
-
PixieFAIL – 9 UEFI Flaws Expose Computers to Remote Attacks
Hackers exploit UEFI flaws to gain unauthorized access to a system’s firmware, enabling them to implant persistent malware or manipulate the boot...
-
CISA & FBI released Incident Response Guide for WWS Sector
Malicious cyber incidents, such as ransomware and unauthorized access, have affected the Water and Wastewater Sector (WWS) in the past few years....
-
OSINVGPT – A Tool For Open-source Investigations
OSINVGPT is an AI-based system that helps security analysts with open-source investigations and tool selection. While this tool was developed by...
-
Bigpanzi Bot Hacks 170,000+ Android TVs to Launch DDoS Attacks
Android TVs are widely used, and due to their wide adoption, threat actors frequently target them for unauthorized access or data theft. In...
-
FBI & CISA Warns of risk to critical infrastructure by Chinese Drones
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have raised a red flag: Chinese-made...
-
Hackers Deploying Androxgh0st Botnet Malware that Steals AWS, Microsoft Credentials
Threat actors use botnet malware to gain access to the network of compromised systems that enable them to perform several types of illicit...
-
macOS Infostealers That Actively Involve in Attacks Evade XProtect Detection
Ever since the beginning of 2023, infostealers targeting macOS have been on the rise with many threat actors actively targeting Apple devices. As...