GB Hacker
-
New OilRig Downloaders Abusing Microsoft Cloud APIs for C&C Communications
Threat actors engage in cyberespionage to gain the following advantages:- Strategic Political Economic Military Hackers do...
-
HCL Investigating Ransomware Attack on Isolated Cloud Environment
In the dynamic realm of IT, HCL Technologies, the Noida-based juggernaut, recently found itself navigating choppy digital waters. The...
-
Hackers Abuse Bot Protection Tool to Launch Cyber Attacks
Predator, a bot protection tool designed to fight against bots and crawlers, has now been found to be abused by threat actors for malicious...
-
Hackers Stole Banking Details From Over 50,000 Users Via Web Injections
Web injections involve injecting malicious code into websites to manipulate content or redirect users to fraudulent sites. Threat actors use...
-
Interpol Arrested 3,500 Suspects and Seized $300 Million
In a groundbreaking initiative spanning 34 countries, INTERPOL orchestrates Operation HAECHI IV, a relentless assault on online financial crime,...
-
Sidewinder Hacker Group Using Weaponized Documents to Deliver Malware
Sidewinder APT group’s sophisticated threat landscape reveals a skilled and persistent threat targeting the Nepalese Government entities....
-
Tech Device Manufacturers Urged by CISA to Remove Default Passwords
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) has requested technology device manufacturers to take measures to eliminate...
-
New SMTP Smuggling Attack Lets Hackers Send Spoofed Emails
SMTP (Simple Mail Transfer Protocol) smuggling is a technique where attackers exploit the inconsistencies in how proxy servers or firewalls...
-
QakBot Malware Emerges with New Tactics, Attacking Hospitality Industry
QakBot (aka Qbot) primarily targets financial institutions since it is a sophisticated banking trojan and malware. This malware can...
-
8220 Hacker Group Attacking Windows & Linux Web Servers
The 8220 hacker group, which was first identified in 2017 by Cisco Talos, is exploiting both Windows and Linux web servers with crypto-jacking...
-
3CX Asks Customers to Disable SQL Database Integrations to Stop Hack Attacks
3CX, a VoIP communications firm, has advised customers to disable SQL Database integrations due to the risks posed by a potential vulnerability....
-
NKAbuse Malware Attacking Linux Desktops & Use Corn Job for Persistence
Threat actors target Linux systems due to their prevalence in server environments, and cron jobs offer a discreet means of maintaining...