GB Hacker
-
Hackers Deploy New Information Stealer Malware onto Python Developers’ Machines
Researchers at Phylum recently discovered that hackers had been injecting information stealer malware into Python developers’ machines in order to...
-
Critical Linux Kernel Vulnerability Let Attackers Execute Arbitrary Code Remotely
SMB servers that have ksmbd enabled are vulnerable to hacking due to a major Linux kernel vulnerability (CVSS score of 10). KSMBD is a Linux...
-
Hackers Using Automated Attack to Exploit Exchange Server and SQL Injection Vulnerabilities
Recently, cybersecurity analysts at Prodraft’s threat intelligence team detected that the hacker group FIN7 was actively exploiting...
-
KmsdBot Botnet Leverages SSH to Compromise Systems and to Launch DDoS Attacks
Researchers from Akamai have continued to study the cryptomining botnet KmsdBot and have looked at its attack flow. It is believed that KmsdBot is...
-
OWASSRF – New Exploit Let Attacker Execute Remote Code on Microsoft Exchange Server
There is a new exploit chain dubbed, OWASSRF that threat actors are actively exploiting to gain arbitrary code execution through Outlook Web...
-
Windows Code-Execution Vulnerability Let Attackers Run Malicious Code Without Authentication
It has recently been discovered by researchers that Windows has a vulnerability that allows code execution that rivals EternalBlue in terms of...
-
Hackers Use New BrasDex Android Malware to Steal Users’ Banking Details
A new Android trojan called BrasDex has been identified as the work of the same threat actors responsible for the Casbaneiro malware that targets...
-
Google’s New End-To-End Encryption for Gmail on the Web
On Friday, Google released a beta version of Client-side encryption (CSE) for Gmail. This newest service is only useful to organisations that can...
-
Microsoft Discovered a Vulnerability in macOS That Allow Attackers to Install Malware
The macOS operating system was fixed recently by Apple to eliminate a vulnerability found and reported by the principal security researcher of...
-
My Identity was Stolen! Here’s How You Might Become a Target
Impersonating someone is an activity as old as mankind and has been performed to a great comedic effect by comedians and clowns throughout the...
-
Beware of Highly Sophisticated DarkTortilla Malware Distributed Via Phishing Sites
Cyble Research and Intelligence Labs (CRIL) detected threat Actors (TAs) distributing the malware DarkTortilla. Since 2015, the complex .NET-based...
-
Hackers Use Trojanized Windows 10 Installer To Attack Against Government Entities
Mandiant recently identified that in a targeted attack on Ukrainian government entities, trojanized ISO files were used by threat actors to cloak...