GB Hacker
-
3 New Malicious PyPI Packages Found Installing CoinMiner on Linux Devices
Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting...
-
Google Chrome Use After Free Flaw Let Attacker Hijack Browser
The latest stable channel update for Google Chrome, version 120.0.6099.199 for Mac and Linux and 120.0.6099.199/200 for Windows, is now available...
-
Free Decryptor Tool Released for the Black Basta Ransomware
A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor tool. Active...
-
Four Cyber Criminals Convicted of Spreading ChatGPT-Assisted Ransomware
Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its sort in China,...
-
Wireshark 4.2.1 Released: What’s New!
Wireshark is a popular open-source network protocol analyzer that allows users to inspect and capture data on a network in real time. It...
-
New Google Cookies Exploit Allows Access After Password Reset
A Critical Google Cookies exploit involves manipulating or stealing user cookies, which store authentication information, to gain unauthorized...
-
New DLL Hijacking Technique Let Attackers Bypass Windows Security
DLL hijacking is a technique where a malicious DLL (Dynamic Link Library) is placed in a directory that a vulnerable application searches before...
-
Multiple Flaws in Google Kubernetes Engine Let Attackers Escalate Privileges
Google Kubernetes Engine (GEK) has been detected with two flaws that a threat actor can utilize to create significant damage in case the threat...
-
10 Most Common Types of Cyber Attacks in 2023
Cyber attacks are evolving rapidly with advancements in technology, as threat actors exploit new vulnerabilities in:- Software Networks...
-
650,000+ Malicious Domains Registered Resembling ChatGPT
Hackers abuse the ChatGPT name for malicious domains to exploit the credibility associated with the ChatGPT model, deceiving users into trusting...
-
New Medusa Stealer Attacking Users to Steal Login Credentials
While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2, a significantly...
-
Chinese Hackers Exploit New Zero-Day in Barracuda’s ESG to Deploy Backdoor
Barracuda Email Security Gateway (ESG) Appliance has been discovered with an Arbitrary code Execution vulnerability exploited by a China Nexus...