Category: GBHackers On Security

Secure Coding Practices to Ensure Application Security

Read the original article: Secure Coding Practices to Ensure Application Security The security of anything developed by writing a code comes down to the precautions followed […]Content was cut in order to protect the source.Please visit the source for the…

Hackers Abusing GitHub Infrastructure To Mine Cryptocurrency

Read the original article: Hackers Abusing GitHub Infrastructure To Mine Cryptocurrency The IT service management portal, GitHub, is actively reviewing a series of attacks, as the threat actors are rigorously abusing the infrastructure and the servers of GitHub to mine…

Spear Phishing is the Next Big Challenge for CISOs

Read the original article: Spear Phishing is the Next Big Challenge for CISOs Phishing, which started off as Nigerian Prince scams in the 1990s, has become a common attack vector ever since. As though phishing wasn’t enough of a cybersecurity…

How to Prevent wp-vcd malware Attacks on Your Website?

Read the original article: How to Prevent wp-vcd malware Attacks on Your Website? If your WordPress security plugin is flagging your website with a message Backdoor: PHP/wp-vcd.5473 – malicious code; it is possible that your website is infected with wp-vcd…

Researchers Found RedXOR Malware Linked to Chinese Hackers

Read the original article: Researchers Found RedXOR Malware Linked to Chinese Hackers Security researchers at Intezer have recently discovered malware that has been continuously targeting Linux endpoints and servers. Apart from this, the malware that has been detected by the…

Russian Hackers Exploited Lithuanian Infrastructure to Launch Cyber-attacks

Read the original article: Russian Hackers Exploited Lithuanian Infrastructure to Launch Cyber-attacks Russia-linked APT groups leveraged the Lithuanian nation’s technology infrastructure to launch cyber-attacks against targets worldwide. A report by Lithuania’s intelligence service says  “Hacker groups linked to Russian intelligence…

Connections Between Four of 2020’s Biggest Ransomware Strains Found

Read the original article: Connections Between Four of 2020’s Biggest Ransomware Strains Found Chainalysis is a blockchain analysis company. They provide data, software, services, and research to government agencies, exchanges, financial institutions, and insurance and cybersecurity companies in over 50…

Hackers Use SEO Techniques to Push Gootloader Malware Via Google

Read the original article: Hackers Use SEO Techniques to Push Gootloader Malware Via Google The Javascript-based infection framework for the Gootkit RAT increasingly delivers a wider variety of malware, including ransomware payloads. The delivery system for the Gootkit information stealer…

Unpatched SHAREit Flaw Let Attackers Execute Remote Code

Read the original article: Unpatched SHAREit Flaw Let Attackers Execute Remote Code SHAREit app is owned by Smart Media4U Technology Pte. Ltd. which is a global technology company in Singapore. SHAREit was originally made by Chinese tech giant Lenovo.  …

5 Considerations When Implementing A SOC Program

Read the original article: 5 Considerations When Implementing A SOC Program As cyberattacks become more sophisticated than ever, establishing a security operations center (SOC) has become essential. The SOC is a central IT center from where you can coordinate your…

Yandex Data Breach – Employee Caught Selling Access to User Accounts

Read the original article: Yandex Data Breach – Employee Caught Selling Access to User Accounts Yandex N.V. is a Russian Dutch-domiciled multinational corporation providing Internet-related products and services including transportation, search and information services, eCommerce, navigation, mobile applications, and online…