GB Hacker
-
KmsdBot Botnet Leverages SSH to Compromise Systems and to Launch DDoS Attacks
Researchers from Akamai have continued to study the cryptomining botnet KmsdBot and have looked at its attack flow. It is believed that KmsdBot is...
-
OWASSRF – New Exploit Let Attacker Execute Remote Code on Microsoft Exchange Server
There is a new exploit chain dubbed, OWASSRF that threat actors are actively exploiting to gain arbitrary code execution through Outlook Web...
-
Windows Code-Execution Vulnerability Let Attackers Run Malicious Code Without Authentication
It has recently been discovered by researchers that Windows has a vulnerability that allows code execution that rivals EternalBlue in terms of...
-
Hackers Use New BrasDex Android Malware to Steal Users’ Banking Details
A new Android trojan called BrasDex has been identified as the work of the same threat actors responsible for the Casbaneiro malware that targets...
-
Google’s New End-To-End Encryption for Gmail on the Web
On Friday, Google released a beta version of Client-side encryption (CSE) for Gmail. This newest service is only useful to organisations that can...
-
Microsoft Discovered a Vulnerability in macOS That Allow Attackers to Install Malware
The macOS operating system was fixed recently by Apple to eliminate a vulnerability found and reported by the principal security researcher of...
-
My Identity was Stolen! Here’s How You Might Become a Target
Impersonating someone is an activity as old as mankind and has been performed to a great comedic effect by comedians and clowns throughout the...
-
Beware of Highly Sophisticated DarkTortilla Malware Distributed Via Phishing Sites
Cyble Research and Intelligence Labs (CRIL) detected threat Actors (TAs) distributing the malware DarkTortilla. Since 2015, the complex .NET-based...
-
Hackers Use Trojanized Windows 10 Installer To Attack Against Government Entities
Mandiant recently identified that in a targeted attack on Ukrainian government entities, trojanized ISO files were used by threat actors to cloak...
-
FBI Seized 48 Domains Linked to World’s Leading DDoS-for-Hire Services
In an attempt to reduce the entry barrier for malicious activity, the U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 48...
-
Hackers Use SVG Images to Install QBot Malware on Windows Systems
To perform HTML smuggling, the QBot malware phishing campaigns utilize SVG image files as a method of distribution. This method creates a...
-
FortiOS SSL-VPN Bug Let Attackers Execute Arbitrary Code Remotely
A critical vulnerability in FortiOS SSL-VPN let attackers perform unauthenticated arbitrary code execution remotely, and this flaw has been...