GB Hacker
-
Facebook Takedown Infrastructure of Hacker Groups Targeting Various Government Entities
Bangladesh and Vietnam based hackers were caught by Facebook recently for hacking into its users’ accounts and taking control of the pages....
-
Russian APT28 Hackers Uses COVID-19 Lures to Deliver Zebrocy Malware via VHD File
The security firm Intezer revealed COVID-19 phishing lures that were used to deliver the Go version of Zebrocy. Zebrocy is mainly used against...
-
OpenSSL Flaw Would Allow Attackers to Cause a denial-of-service Condition
OpenSSL has released a Security Advisory [on 8th of December 2020] regarding the vulnerability CVE-2020-1971 which is called EDIPARTYNAME NULL...
-
‘Amnesia:33’ TCP/IP Flaws Affect Millions of IoT Devices
Forescout Research Labs has launched Project Memoria, an initiative that aims at providing the community with the most important study on the...
-
Cyber Security Gaint FireEye Got Hacked – Hackers Stole Red Team Tools
The hunter becomes the hunted. FireEye, a California-based cybersecurity giant is the latest victim to have its systems hacked. Fireeye states...
-
DeathStalker Hacker Group’s New PowerPepper Malware Evade Antivirus Detection to Bypass Windows
Researchers uncovered a new Malvertising campaign PowerPepper from DeathStalker threat actor group that is active since 2012, and actively...
-
CrowdSec, An Open-Source, Modernized & Collaborative Intrusion Prevention System (fail2ban)
CrowdSec is a security automation engine designed to protect servers, services, containers, or virtual machines exposed on the internet with a...
-
USBStealer – Password Hacking Tool For Windows Applications to Perform Windows Penetration Testing
USBStealer is a Windows Based Password Hacker Tool that helps to Extract the password from Windows-Based Applications such as Chrome Password,...
-
Most Important Network Penetration Testing Checklist
Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services...
-
Google Discloses a zero-click Wi-Fi Exploit to Hack iPhone Devices
Google Project Zero has disclosed the details of an iOS exploit that allows an attacker to hack iPhones remotely over Wi-Fi and steal sensitive...
-
Critical Oracle WebLogic Vulnerability Flaw Actively Exploited by DarkIRC Malware
Juniper Threat Labs researchers observed active attacks on Oracle WebLogic software using CVE-2020-14882. This vulnerability, if successfully...
-
New malicious NPM packages Used by Attackers Install njRAT Remote Access Trojan
No, not the one that nibbles at your Thanksgiving leftovers. RAT, Remote Access Trojan, is a type of malware that enables attackers to take over...