GB Hacker
-
North Korean Hackers Targeting Healthcare to Fund for Malicious Activities
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has issued a new advisory regarding cybersecurity. This advisory details recent...
-
Live Cyber Forensics Analysis with Computer Volatile Memory
The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted...
-
Finland’s Most-Wanted Hacker Arrested in France
A 25-year-old Finnish man named Julius “Zeekill” Kivimäki was taken into custody this week in France. He is facing charges of extorting an online...
-
How Application Mapping Can Boost Application Security
Application security refers to the measures taken to protect the confidentiality, integrity, and availability of an application and its associated...
-
Researcher Hacked Toyota’s Global Supplier Portal
The Global Supplier Preparation Information Management System, or GSPIMS, of Toyota, was breached by a security researcher using a backdoor. After...
-
Major CrackDown – Police Hacked Exclu ‘secure’ Cybercriminal Message Platform
The police and the Public Prosecution Service in the Netherlands have been able to gain access to data from a crypto communication service used by...
-
Exploit Released for GoAnywhere File Transfer Zero-Day Flaw
A zero-day vulnerability affecting on-premise instances of Fortra’s GoAnywhere MFT-managed file transfer solution was actively exploited,...
-
Hackers Actively Exploiting VMware ESXi Servers to Deploy Ransomware
CERT-FR, the French Computer Emergency Response Team (CERT-FR), as well as administrators and hosting providers, have issued a warning concerning...
-
High-severity Vulnerability in F5 BIG-IP Let Attackers Execute Arbitrary Code
F5 reports a high-severity format string vulnerability in BIG-IP that might allow an authenticated attacker to cause a denial-of-service (DoS)...
-
Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware
The cybersecurity analysts at Check Point Research recently reported that TrickGate, a shellcode-based packer, has been in operation for over six...
-
Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums
Cyble Research and Intelligence Labs (CRIL) is a security research organization that has been monitoring the actions of a group of cyber criminals...
-
New Prilex Malware Blocks Contactless Payments to Steal Credit Card Data
Prilex is indeed a single threat actor that transformed from malware targeted at ATMs into distinctive modular point-of-sale (PoS) malware. Prilex...