Tag: GBHackers – Latest Cyber Security News | Hacker News

Gmail Flaw Let Hackers Bypass Security Checks

Gmail has the highest number of users, amounting to a massive 1.5 billion, which is 18.75% of the world population. Gmail is well-known for its security features which prevent hackers from taking over user accounts.  Gmail has released a new…

Redbus & MakeMyTrip Bug Let Users Book Free Seats

RedBus and MakeMyTrip Limited, two of India’s biggest online travel agencies, allow users to reserve free seats. Mr. Vishnu Thulasidoss had intended to go to his hometown a few months ago when he was interning in Chennai for several reasons.…

Most Important Web Server Penetration Testing Checklist

Web server pentesting is performed under 3 significant categories: Identity, Analyse, and Report Vulnerabilities such as authentication weakness, configuration errors, and protocol Relation vulnerabilities.  1.  “Conduct a serial of methodical and Repeatable tests “ is the best way to test the web…

Millions of PC Motherboard Were Sold With Backdoor Installed

Gigabyte systems have been identified by the Eclypsium platform for exhibiting suspicious backdoor-like behavior. This discovery marks a recent development in detecting potential security vulnerabilities in Gigabyte systems. The Eclypsium platform employed heuristic detection methods to identify potential supply chain…

Kali Linux 2023.2 Released – What’s New!

Users of Kali Linux can now upgrade to the 2023.2 version, which has many new features and enhanced capabilities. The post Kali Linux 2023.2 Released – What’s New! appeared first on GBHackers – Latest Cyber Security News | Hacker News.…

Google CTF 2023 – Rewards over $32,000 For Winners

CTF (Capture The Flag) exercises have existed for several years. These CTF exercises provide a great challenge and provide great knowledge for ethical hackers and Bug Bounty Hunters. Many companies have been conducting CTF competitions very often as a part…

Free VPN Data Breach – Over 360 Million User Records Exposed

Based on reports from Jeremiah Fowler, a non-password-protected database exposed nearly 360 million records related to a VPN. The database contained email addresses, device information, and even website references that users visited. According to the investigation, these records belonged to…

APT Hacker Group Attacking SMBs to Use Their Infrastructure

Proofpoint’s security researchers have identified indications of sophisticated threat actors focusing their attention on small and medium-sized enterprises and service providers operating within that particular ecosystem. The researchers recently issued a cautionary message in their latest report regarding a collection…

Apria Healthcare Hacked – Over 2M Users Data Exposed

Apria HealthCare Inc. is a leading home medical equipment and clinical support provider. The company was founded in 1924 and had a net worth of $644 million headquartered in Indianapolis, US. On 23rd May 2023, Apria released a notification letter…

Fully Encrypted GuLoader Uses Google Drive to Download Payloads

Antivirus products continuously advance to combat evolving threats, prompting malware developers to create new bypassing techniques like “packing” and “crypting,” GuLoader is a notable service employed by cybercriminals to avoid detection by antivirus software. The cybersecurity researchers at Check Point…

What are the Common Security Challenges CISOs Face?

Chief Information Security Officers (CISOs) hold a critical and challenging role in today’s rapidly evolving cybersecurity landscape. Here are the common security challenges CISOs face. As organizations increasingly rely on technology to drive their operations, CISOs face complex security challenges…

Hackers Use Weaponized DOCX File to Deploy Stealthy Malware

CERT-UA has identified and addressed a cyber attack on the government information systems of Ukrainian governmental state bodies. Through investigation, it was discovered that the department’s email address received communications on April 18, 2023, and April 20, 2023, appearing to…

WhatsApp Now Allow You to Edit Sent Messages

Editing messages is one of the key features that WhatsApp has been missing for a while. Ever since the Facebook takeover in 2014, there have been several additional features, including 24-hour status, video status, etc.,  Recent reports stated that the…

Russian IT Guy Jailed for DDoSing Government Websites

According to reports from the FSB (Federal Security Service) Department’s Press Service in Rostov Region, Yevgeny Kotikov, an IT specialist, was sentenced to three years imprisonment. FSB also ordered to pay a fine of 800 thousand rubles ($10,000) for his…

Hackers Using AI Tools Like ChatGPT to Deploy Malware

Malicious ad campaigns with themes connected to artificial intelligence (AI) tools like Midjourney and ChatGPT have been seen in Google’s search engine, according to Trendmicro researchers. When a user types in the keyword “midjourney” into Google, several malicious advertisements are…

Reveal(x) – New Tool to Defend Against ChatGPT Data Leaks

ExtraHop released a new tool called “Reveal(x)” that helps organizations understand their potential risk exposure from employee use of OpenAI ChatGPT by providing visibility into the devices and users on their networks connecting to OpenAI domains. ChatGPT has become highly…

Researchers Uncovered Notorious QakBot Malware C2 Infrastructure

Tam Cymru researchers have recently revealed noteworthy patterns and irregularities from their continuous monitoring of QakBot’s command and control infrastructure.  The researchers shared high-level insights into the findings, shedding light on emerging trends and unusual activities related to QakBot. From…

ChatGPT Chief Testifies on AI risks To US Congress

To mitigate the threats posed by increasingly potent AI systems, government action will be essential, according to the CEO of the artificial intelligence company that produces ChatGPT. The success of OpenAI’s chatbot, ChatGPT, provoked worries and an AI arms race…

Insurance Industry Suffers 12x More Cyber Attacks

The Insurance industry was the most targeted sector in Q1, 2023, according to Indusface’s State of Application Security report, with 12 times more attacks than any other sector. Another report from the same year reveals that the insurance industry witnessed…

WhatsApp – Now you Can Lock & Hide Chats with a Password

Meta is introducing a new “Chat Lock” feature for WhatsApp to assist customers in securing their conversations. “We’re excited to bring to you a new feature we’re calling Chat Lock, which lets you protect your most intimate conversations behind one more…

Ferrari Website Flaw Exposes Their Database Credentials

Based on the recent report from char49, it appears that there was a critical flaw in Ferrari’s subdomain, which led to an arbitrary file read vulnerability. The vulnerability existed in the media.ferrari.com subdomain using a vulnerable WordPress plugin (W3 Total…

WordPress Plugin Flaw Let Attackers Hijack 1m Websites

The widely-used Elementor plugin, “Essential Addons for Elementor,” has been discovered to have a security flaw that enables unauthorized users to gain administrative control, potentially impacting millions of WordPress websites. PatchStack recently uncovered a critical unauthenticated privilege escalation vulnerability, tracked…

WhatsApp Can’t be Trusted, Warns Elon Musk

After a Twitter engineer posted photos of an Android dashboard showing his WhatsApp microphone being used while he slept, Elon Musk declared that WhatsApp could not be trusted. A developer for Twitter named Foad Dabiri said that while he was sleeping,…

FBI Seized 13 Websites that Offered DDoS-for-hire Services

The FBI has been coordinating Operation PowerOFF since 2018, aiming to disrupt the DDoS-for-hire service infrastructures worldwide.  As part of this Operation, On May 8th, 2023, the FBI seized around 13 internet domains that offered DDos-for-hire services. The FBI has…

Twitter Flaw Exposes Private Circle Tweets to Public

According to reports, there has been a security incident with Twitter’s Private Circle tweets feature as they have been exposed publicly. Twitter’s Private Circle was a feature introduced by Twitter in 2022, in which users can send their tweets to…

Best SIEM Tools List For SOC Team – 2023

What is SIEM? A security information and event management (SIEM) system is the foundation of security processes in the modern security operations center (SOC). A SIEM saves security analysts the effort of monitoring many different systems.  SIEM systems integrate with…

PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

GBHackers come across a new ChatGPT-powered Penetration testing Tool called “PentestGPT” that helps penetration testers to automate their pentesitng operations. PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore. It is…

Authorities Dismantled the Card-Checking Platform Try2Check

As per reports, the U.S government authorities have dismantled yet another large network of cybercriminals. Denis Gennadievich Kulkov, the prime owner of the illegal network, was charged with access fraud, computer intrusion, and money laundering through his “Try2Check” platform. Try2Check…

Malware Campaigns Abusing Telegram Bots to Spread Rapidly

Numerous updates and alterations were witnessed in the major malware families employed in phishing scams during the first quarter of 2023, alongside significant variations in TTPs. The Cofense Intelligence team has recently published Active Threat Reports, which provide insights into…

New BGP Protocol Flaws Let Attackers Trigger DoS Attacks

Forescout Vedere Labs recently highlighted the neglected BGP security aspect – software implementation vulnerabilities. FRRouting’s BGP message parsing vulnerabilities discovered by Forescout Vedere Labs could enable attackers to trigger a DoS state on susceptible BGP peers. Major networking vendors depend…

ChatGPT Service Back in Italy, After the Ban

Earlier this month, Italian SA raised a temporary ban for ChatGPT as there was a data breach in March 2023. Along with this, the application had data privacy issues and lack of age affirmation which made authorities conclude this decision.…

Google Adds New Cyber Security Tools & Features to ChromeOS

As per reports, cybercrime will reach $10.5 trillion by 2025, including all kinds of cybercrime activities like RaaS, Phishing, malware, and much more. It will be mandatory for organizations to protect themselves from these threats.  According to Google, “ChromeOS, this…

TCP vs UDP – Understanding the Difference

If you have ever had to configure a firewall, set up a router, or choose the best VPN for your computer, chances are you heard of the TCP and UDP protocols. However, if you’re reading this article, you’re probably confused…

Cisco Zero-Day Flaw: Let Remote Attackers Launch XSS Attacks

A zero-day flaw in Cisco’s Prime Collaboration Deployment (PCD) software that can be used to launch cross-site scripting attacks has been identified. “A vulnerability in the web-based management interface of Cisco Prime Collaboration Deployment could allow an unauthenticated, remote attacker…

Cisco Launches Advanced Threat Detection XDR Platform

In the recent hybrid, multi-vendor, multi-threat world, Cisco Extended Detection and Response (XDR) streamlines security operations with unrivaled visibility across the network and endpoint. To accomplish its goal of the Cisco Security Cloud, a unified, AI-driven, cross-domain security platform, Cisco…

Google Authenticator Major Update Brings Cloud Backup Feature

Google Authenticator was launched in 2010, which provides additional security for various applications by providing authentication codes for every sign-in. This prevents attackers from account takeover on any application linked with Google Authenticator. Google has launched various authentication mechanisms like…