GB Hacker
-
Conti Ransomware Operators Using ‘BazarCall’ Style Attack as an Initial Vector
In the context of phishing attacks, a BazarCall style attack is a form of targeted phishing that uses a call-back methodology in order to trick...
-
Top 10 Best Penetration Testing Companies – 2022
Penetration Testing Companies are pillars when it comes to information security, nothing is more important than ensuring your systems and data...
-
The Building Blocks of Zero Trust Security Architectures on AWS
Amazon Web Services (AWS) is a leading cloud platform holding a dominant grip of 41.5% of the public cloud market. AWS has over 1 million users...
-
Ex-Twitter Employee Found Guilty of Sharing User’s Private Information to Saudi Arabia
A former Twitter employee was found guilty of acting as an agent of a foreign government and illegally sharing Twitter user information. Reports...
-
Cisco Was Hacked by Yanluowang Ransomware Operators to Stole Internal Data
Recent reports indicate that in late May Cisco’s corporate network was infected with ransomware from the Yanluowang group. Under the threat of...
-
Global Scam-as-a-service Operation “Classiscam” Target Users to Steal Payment Data
The cybersecurity firm Group-IB, one of the world’s most prominent companies, has identified Classiscam as a potential threat. This recent wave...
-
Hackers Use Open Redirect Vulnerabilities in Online Services to Deliver Phishing Content
Researchers at Resecurity noticed threat actors leveraging Open Redirect Vulnerabilities which is popular in online services and apps to evade...
-
Kali Linux 2022.3 Released – What’s New !
Kali Linux 2022.3 was released recently, which contains new tools for hacking that were never before available. All the updates in this release...
-
Chinese APT Hackers Target Govt & Defense Orgs Using New Windows Malware
In January, a series of attacks using new Windows malware was detected using several countries in Eastern Europe to backdoor entities in the...
-
Beware of New Malware that Distributed through Compromised YouTube Accounts
Cyble Research Labs (CRL) specifies that the stealers such as PennyWise and RedLine are increasing and spreading through YouTube campaigns. In...
-
Masscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 Minutes
Masscan – Worlds fastest scanner can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second. Masscan is an...
-
Stegomalware Surge – Attackers Using File, Video, Image & Others To Hide Malware
A surge in the number of Stegomalware instances using Steganography has been reported recently by the cybersecurity experts at Cyble Research...