GB Hacker
-
Hackers Attack Linux SSH Servers with Tsunami DDoS Malware
Hackers Attack Linux SSH Servers. An attack campaign has been recently uncovered by AhnLab ASEC, where poorly controlled Linux SSH servers are...
-
Stealthy SMS Side-Channel Attack Exposes SMS Recipient Location
Stealthy SMS Side-Channel Attack Exposed. When you send an SMS, delivery reports let you know if your message reached the recipient. But here the...
-
Megaupload Developers Plead Guilty to Avoid US Extradition
Recently, the High Court in Auckland sentenced the Megaupload programmers to jail after they admitted guilt and agreed to provide testimony...
-
Sign in to Leak Your Credentials – Attackers Abusing Legitimate Services
An ongoing phishing campaign has found that attackers abuse legitimate credential harvesting services and data exfiltration to avoid detection....
-
Hackers Are Actively Using New Mystic Stealer Malware in Cyber Attacks
Recently, the cybersecurity researchers at CYFIRMA found that hackers are actively using “Mystic Stealer Malware,” a new information stealer....
-
Android GravityRAT Spyware Steals WhatsApp Backup Files
Since August 2022, a recently discovered Android virus named “GravityRAT” has rapidly circulated through a new Android malware campaign. It gains...
-
Microsoft Confirms Hacking of Outlook & OneDrive – Layer 7 DDoS Attacks
Recently, it’s been confirmed by Microsoft that the current outage problems experienced by the following services of Microsoft were due to...
-
Hackers Set Up Fake GitHub Repos to Deliver Malware Posing as Zero-day
Recently, the cybersecurity researchers at VulnCheck identified a growing trend of hackers masquerading as cybersecurity researchers on social...
-
LockBit Ransomware Gang Earned $91 Million Ever Since It Discovered
LockBit was one of the most widely used ransomware in 2022, targeting both small and large organizations irrespective of their size or net worth....
-
New EMFI Attack Against Drones Leads to Complete Take Over
Based on the recent reports by IOActive, Drones, also called Unmanned Aerial Vehicles (UAVs), are vulnerable to code injection, which would result...
-
Chinese Hackers Exploit VMware ESXi Zero-Day to Execute Privileged Commands
The Chinese cyberespionage gang, identified as UNC3886, has been spotted employing a VMware ESXi zero-day vulnerability to get escalated...
-
Massive Phishing Campaign Uses 6,000 Sites to Mimic Popular Brands
Bolster’s threat research team recently discovered an extensive brand impersonation effort targeting over 100 well-known clothes, footwear, and...