GB Hacker
-
DarkGate Loader Delivered Through Stolen Email Threads to Lure Victims
The research revealed high malspam activity of DarkGate malware distributed via phishing emails to the users either through MSI files or VBs...
-
Hackers Abuse Azure AD Abandoned Reply URLs to Escalate Privilege
Recent reports indicate that there has been a privilege escalation vulnerability discovered, which arises due to abandoned Active Directory URLs....
-
Hackers Can Exploit Skype Vulnerability to Find User IP Address
Hackers can now capture your IP address and expose your physical location by sending a Skype link, even if you don’t click it. An IP address,...
-
Mom’s Meals Breached: Over 1.2 Million Consumers Data Exposed
PurFoods, LLC, operating under the trade name Mom’s Meals, has announced the compromise of personal information affecting its clients and...
-
Microsoft Edge Privilege Escalation Flaw – Update Now!
Microsoft Edge has published a release note that mentioned a Privilege escalation vulnerability with the CVE ID of CVE-2023-36741 and has a CVSS...
-
Hackers Embed Weaponized Word File into a PDF to Evade Detection
To avoid detection, hackers employed a new method dubbed “MalDoc in PDF” to insert a malicious Word file into a PDF file. Despite having magic...
-
Lockbit 3.0 Builder Leaked: Anyone Can Blend Ransomware
It has come to the attention of researchers that the LockBit 3.0 builder has suffered from a leak, which now allows anyone to create various...
-
Cisco Nexus 3000 and 9000 Series Switches Flaw Let Attackers Trigger DoS Attack
A Denial-of-Service vulnerability has been discovered in the Cisco Nexus 3000 and 9000 series switches, which could allow a threat actor to cause...
-
Cisco NX-OS Software Flaw Let Attacker Trigger a DoS Attack
A high-severity vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software might allow an unauthenticated local attacker...
-
Cloud Hosting Provider Lost all Customer Data Following Ransomware Attack
There has been a cyber attack on two cloud hosting providers, namely CloudNordic and Azero Cloud, which Certiqa Holding owns. The cyberattack has...
-
Wireshark 4.0.8 Release: What’s New!
The most widely used network protocol analyzer in the world, Wireshark, has released version 4.0.8. It is employed for network analysis,...
-
What are Brute Force Attacks, and How to Protect Your APIs Against them?
Brute force attacks have been one of the most common attack types. In Q1 2022, brute force made up 51% of all attacks! These attacks often pave...