Category: GBHackers on Security | #1 Globally Trusted Cyber Security News Platform

New SharePoint Technique Lets Hackers Bypass Security Measures

Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without triggering standard detection mechanisms. Illicit file downloads can be disguised as harmless activities, making it difficult for cybersecurity defenses to detect…

Cyber Attack on Consulting Firm Exposes DOJ Data of 341,000 People

Greylock McKinnon Associates, a prominent consulting firm, has reported a cyber attack that exposed personal data belonging to 341,000 individuals, including sensitive information from the Department of Justice (DOJ). Greylock McKinnon Associates, located at 75 Park Plaza, Boston, MA, discovered…

Targus Hacked: Attackers Gain Access to File Servers

Targus International, LLC and its affiliates fell victim to a sophisticated cyberattack. The company, an indirect subsidiary of B. Riley Financial, Inc., announced that an unauthorized entity breached its file systems, prompting an immediate and robust response to mitigate the…

Top Israeli Spy Chief Identity Exposed In A Privacy Mistake

Privacy mistakes could pose a serious threat to sensitive information or systems,, which threat actors could exploit for their gain. These mistakes can include weak passwords, unsecured networks, and outdated software, making it easier for threat actors to infiltrate and…

HTTP/2 Vulnerability Let Hackers Launch DOS Attacks on Web Servers

Researchers identified a significant vulnerability within the HTTP/2 protocol, potentially allowing hackers to launch Denial of Service (DOS) attacks on web servers. The vulnerability tracked as CVE-2024-28182 has raised concerns among internet security experts and prompted responses from various technology…

AGENT TESLA Malware Steals login Credentials From Chrome & Firefox

Researchers investigated a recent Agent Tesla malware campaign targeting US and Australian organizations, which used phishing emails with fake purchase orders to trick victims into clicking malicious links.  Upon clicking, an obfuscated Agent Tesla sample protected by Cassandra Protector was…

Threat Actors Deliver Malware via YouTube Video Game Cracks

Threat actors target home users with information-stealing malware like Vidar, StealC, and Lumma Stealer, which disguises the malware as pirated software and video game cracks in YouTube videos.  The videos appear to instruct users on obtaining free software or game…

Veterinary Giant IT System Attacked by Hackers

CVS Group, a leading veterinary service provider, has confirmed that it fell victim to a cyber-attack involving unauthorized access to a segment of its IT systems. The company’s security protocols swiftly detected the breach, prompting an immediate response to contain…

Multiple Cisco Small Business Routers Vulnerable to XSS Attacks

Cisco has alerted its customers about a critical vulnerability affecting several Small Business RV Series Routers models. This vulnerability, CVE-2024-20362, poses a significant risk, allowing unauthenticated, remote attackers to conduct cross-site scripting (XSS) attacks. The affected models include the RV016,…

Microsoft Two-Step Phishing Campaign Attack LinkedIn Users

The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly used for work communication. Their integration creates cybersecurity vulnerabilities.  Threat actors can target employees on social media using their accounts…

Cloudflare Acquires Baselime to Enhance Serverless Performance

Cloudflare has announced its acquisition of Baselime, a pioneering observability platform designed to simplify the complexities of serverless application development. This acquisition marks a milestone in Cloudflare’s journey towards creating a more intuitive and efficient cloud computing environment. It leverages…

10M+ Downloaded Dating App Discloses User’s Exact Location

In a groundbreaking Check Point Research (CPR) analysis, vulnerabilities have been uncovered in several popular dating applications, cumulatively boasting over 10 million downloads. This investigation focused on the inherent risks associated with the use of geolocation data—a feature that, while…

Multiple Ivanti Connect Secure Flaw Let Attackers Execute Remote Code

Four new vulnerabilities have been discovered in the Ivanti Connect Secure and Policy Secure Gateways. These vulnerabilities were associated with Heap overflow, null pointer dereference, and XML entity Expansion. These vulnerabilities have been assigned with CVEs CVE-2024-21894, CVE-2024-22052, CVE-2024-22053, and…

Feds Patching Years-Old SS7 Vulnerability in Phone Networks

The FCC’s Public Safety and Homeland Security Bureau is seeking input on how communication service providers are securing SS7 and Diameter protocols to prevent location-tracking vulnerabilities.  The protocols are crucial for call routing, network interconnection, and data exchange in mobile…

Hackers Hijacked Notepad++ Plugin to Execute Malicious Code

The AhnLab Security Intelligence Center (ASEC) has detected a sophisticated cyberattack targeting users of the popular text and code editor, Notepad++. Hackers have successfully manipulated a default plugin within the Notepad++ package, potentially compromising the security of countless systems. The…

Hosting Provider VMware ESXi Servers Hit by New SEXi Ransomware

A new ransomware variant is targeting VMware ESXi servers, a popular virtualization platform used by hosting providers worldwide. Dubbed “SEXi” by its creators, this ransomware has already made significant waves, with Powerhost’s CEO revealing a staggering ransom demand of approximately…

New XZ Utils Backdoor Free Scanner to Detect Malicious Executables

A critical vulnerability has been discovered in XZ Utils, a widely used data compression tool across Unix-like operating systems, including Linux. This vulnerability, identified as CVE-2024-3094, involves a backdoor that could potentially allow unauthorized remote access, posing a significant threat…

Jackson County Missouri Ransomware Attack Impacts IT Systems

Jackson County, Missouri, has become the latest victim of a ransomware attack, which has caused substantial disruptions within its Information Technology (IT) systems. This attack has highlighted the vulnerabilities in digital infrastructures and the cascading effects such disruptions can have…

5 Major Phishing Campaigns in March 2024

March saw many notable phishing attacks, with criminals using new tactics and approaches to target unsuspecting victims. It is time to explore some of the five most noteworthy campaigns to understand the current threat landscape better. Pay close attention to…

4 Incident Triage Best Practices for Your Organization in 2024

Maintaining uninterrupted services is vital for any organization. The backbone of ensuring this continuous uptime lies in the Incident Management process. Incident triage is a significant component of this process. It enables organizations to prioritize and address potential incidents efficiently.…

PandaBuy Data Breach: 1.3 Million Customers Data Leaked

PandaBuy, a popular online shopping platform, has been the victim of a significant data breach. This breach has resulted in the leak of personal information belonging to more than 1.3 million customers. The incident has raised serious concerns about cybersecurity…

Live Forensic Techniques To Detect Ransomware Infection On Linux Machines

Ransomware, initially a Windows threat, now targets Linux systems, endangering IoT ecosystems. Linux ransomware employs diverse encryption methods, evading traditional forensics.  Still developing, it shows potential for Windows-level impact. Early awareness allows for assessing IoT security implications. The following cybersecurity…

Veracode Announces Acquisition of Longbow Security

Veracode, a leading provider in the cybersecurity space, has officially announced its acquisition of Longbow Security. This strategic move is poised to revolutionize how organizations manage and mitigate risks in multi-cloud environments, offering a unified solution to the complex challenges…

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI’s recent efforts to dismantle its operations. Initially detected in 2018, WarzoneRAT was disrupted by the FBI in mid-February when they seized the malware’s infrastructure and arrested two individuals linked…

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered platform designed to redefine how we work. This innovative solution aims to streamline communication, enhance collaboration, and boost productivity. It addresses the challenges of dispersed teams…

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and education. The latest update, Wireshark 4.2.4, includes a host of fixes and updates to further cement its position as the go-to tool for network professionals and…

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information and grant unauthorized access. It’s an effective social engineering technique that can bypass even robust technical security measures.  Phishing kits and services provide a low-cost, low-effort…

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including two zero-day exploits showcased at the prestigious Pwn2Own 2024 hacking competition. The update, which affects Chrome users on Windows, Mac, and Linux, elevates the browser version…

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two Chinese Advanced Persistent Threat (APT) groups targeting entities and member countries of the Association of Southeast Asian Nations (ASEAN). This alarming development underscores the escalating cyber…

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included in the Edge Bounty Program. The Microsoft Edge Bounty Program aims to find vulnerabilities that are specific to the upcoming Chromium-based Microsoft Edge, and that instantly affect…

CISA Warns of Hackers Exploiting Microsoft SharePoint Server

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft SharePoint Server, CVE-2023-24955. This vulnerability poses a significant risk to organizations using the platform. It allows attackers with certain privileges to execute code remotely, potentially leading…

Metasploit Framework 6.4 Released: What’s New!

Metasploit Framework 6.4 introduces significant improvements to Kerberos authentication. The auxiliary/admin/kerberos/forge_ticket module now supports diamond and sapphire techniques alongside golden and silver tickets and is compatible with Windows Server 2022.  A new post/windows/manage/kerberos_tickets module allows Kerberos tickets to be dumped…

What is Global Threat Intelligence? – SOC/DIFR Team Guide

Global threat intelligence (GTI) is crucial for cybersecurity as it offers real-time data on emerging and persistent cyber threats worldwide. Threats can originate anywhere, so understanding regional variations is essential.  For example, North Korean actors target government infrastructure, while Eastern…

Giant Tiger Data Breach: Customers Data Exposed Via Vendor

Giant Tiger, a prominent Ottawa-based discount retailer, has announced a breach of customer data. This incident, linked to a third-party vendor responsible for managing the retailer’s customer communications and engagement, has put the personal information of an undisclosed number of…

Microsoft To Ban 50+ Products For Users In Russia

Softline Group, a major IT solutions provider, has confirmed the suspension of access to cloud products offered by Microsoft, Amazon, and Google for Russian customers. Microsoft Corporation has recently announced the suspension of new sales in Russia. This disruption is…