GB Hacker
-
1.4 Million Times Installed Chrome Extensions Steal Browsing Data
Earlier, a report from security firm McAfee detailed the malicious extensions redirecting users to phishing sites and inserting affiliate IDs...
-
Cybercriminals Released Mini Stealer’s Builder & Panel for Free on a Cybercrime Forum
A threat actor has recently released MiniStealer’s builder and panel for free on a cybercrime forum. Cyble Research and Intelligence Labs (CRIL)...
-
New Malware Campaign Disguised as Google Translate Distribute Cryptocurrency Miner
Cryptocurrency mining malware has been found recently in an ongoing campaign in 11 countries disguised as Google Translate and MP3 downloaders....
-
Iranian state-sponsored Actors Exploiting Log4j 2 Flaws in Unpatched Systems
As far as exploiting unpatched Log4j systems to target Israeli entities are concerned, the Iranian state-sponsored threat actors leave no stone...
-
Threat Actors Moving to Sliver Command-and-Control (C2) to Evade Detection
In favor of similar frameworks less familiar to threat actors, threat actors are ditching Cobalt Strike penetration testing. There has been a...
-
LastPass Developer Account Hacked to Steal the Company’s Source Code
LastPass, a freemium password management company was hacked which allows an unauthorized party gain access and steal portions of source code and...
-
ETHERLED – A New Attack Method to Exfiltrate Data from Air-Gapped Devices using LED Indicators
A researcher from Israel, Mordechai Guri, has concluded that he has discovered the possibility of exfiltrating data from air-gapped systems...
-
VMware Flaw Let Attackers Escalate Privilege in VMware Tools Suite
Cloud computing company, VMware addresses local privilege escalation vulnerability in the VMware Tools suite of utilities that impacts both...
-
Google Uncovered Tool used by Iranian APT Hackers to Steal Email Data
There has been an addition to the Iranian APR group Charming Kitten’s malware arsenal recently with the addition of a new malicious tool. This...
-
How Can WAF Prevent OWASP Top 10?
The OWASP Top 10 security risks point out the common vulnerabilities seen in web applications. But it does not list the set of attack vectors...
-
Grandoreiro Banking Trojan Targeting Automotive, Chemicals Manufacturing Industries
The Grandoreiro is a banking trojan that has been identified recently by the security analysts at Zscalerin in recent attacks, and threat actors...
-
Malware in Counterfeit Android Device Attack on WhatsApp and WhatsApp Business
Researchers from Doctor Web identified backdoors in the system partition of budget Android device models which targets WhatsApp and WhatsApp...