Threat actors are actively taking advantage of critical vulnerabilities present in the PaperCut MF/NG print management software. This exploitation aims to plant Atera remote management software onto the targeted servers to gain control over them. From more than 70,000 companies…
Tag: GBHackers – Latest Cyber Security News | Hacker News
Microsoft Changed the Method of Naming the Hacker Groups
Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to confusion about which threat actor was responsible for which threat activity. To solve this, Microsoft has introduced this naming taxonomy…
Enterprise-Attacking Malware Toolkit Analyzing 70 Billion DNS Queries Daily
The ‘Decoy Dog’ malware toolkit, aimed at enterprises, was uncovered recently by the security analysts at Infoblox by analyzing 70 billion DNS records and traffic that differs from typical online behavior. Decoy Dog was discovered in early April 2023, and…
Ghosttoken – A Zero-Day Bug Let Hackers Create Invisible Google Accounts
An Israeli cybersecurity company, Astrix’s Security Research Group, discovered a 0-day vulnerability in Google’s Cloud Platform (GCP) dubbed Ghosttoken on June 19, 2022, which impacts all Google users. The “GhostToken” vulnerability could enable threat actors to make a malicious application…
What is Single Sign-on (SSO) ? – Solution to Ensure Your Company Data Security
Single Sign-on is an authentication process that helps to log in to multiple applications using single login credentials. Security is enhanced through Single Sign-on (SSO) because the various secret password trouble diminishes users. Let be honest; users detest complex passwords;…
ChatGPT Can be Tricked To Write Malware When You Act as a Developer Mode
Japanese cybersecurity experts warn that ChatGPT can be deceived by users who input a prompt to mimic developer mode, leading the AI chatbot to generate code for malicious software. Developers’ security measures to deter unethical and criminal exploitation of the…
First-Ever Cyber Attack Via Kubernetes RBAC to Create Backdoor on Clusters
Recently, a new attack campaign has been discovered by the cybersecurity researchers at Aqua Security that exploits Kubernetes RBAC to assemble backdoors and mine cryptocurrency like Monero. Kubernetes API access control system known as RBAC enables administrators to specify which…
Accidental ‘write’ Permissions In Alibaba PostgreSQL Let Attackers Access Sensitive Data
Two new critical flaws have been found in Alibaba Cloud’s popular services, ApsaraDB and AnalyticDB. Both of them were in support of PostgreSQL. Wiz security research team has termed this vulnerability as #BrokenSesame. One of these vulnerabilities performs Supply-Chain attacks…
Accidental ‘write’ Permissions In Alibaba postgreSQL let Attackers Access Sensitive Data
Two new critical flaws have been found in Alibaba Cloud’s popular services, ApsaraDB and AnalyticDB. Both of them were in support of PostgreSQL. Wiz security research team has termed this vulnerability as #BrokenSesame. One of these vulnerabilities performs Supply-Chain attacks…
AuKill – A Malware That Kills EDR Clients To Attack Windows Systems
A new hacking tool, AuKill, disables Endpoint Detection & Response (EDR) software for threat actors to launch BYOD attacks by deploying backdoors and ransomware on targeted systems. Sophos researchers witnessed the usage of AuKill in two incidents where an adversary…
ICICI Bank Data Leak – Millions of Customers’ Sensitive Data Exposed
Researchers have recently found that the ICICI Bank systems misconfiguration caused data leakage, exposing more than 3.6 million customers’ sensitive data. ICICI Bank, a multinational Indian bank, operates in 15+ countries worldwide and boasts a market value exceeding $76 billion…
Russian APT28 Group Exploiting Vulnerabilities in Cisco Routers
A recent report from CISA (US Cybersecurity and Infrastructure Security Agency) revealed that the APT 28 group was responsible for exploiting Cisco routers with poor maintenance using CVE-2017-6742. CVE-2017-6742 Attack: Reconnaissance with RCE in Cisco SNMP (Simple Network Management Protocol)…
Operation DreamJob – New Linux Malware Linked With 3CX Supply-Chain Attack
ESET researchers have recently discovered that Linux users targeted with malware in the new “Operation DreamJob” Lazarus campaign for the first time. The group behind DreamJob deploys social engineering tactics with the guise of fake job offers as lures to…
Russia-linked APT28 Group Exploiting Vulnerabilities in Cisco Routers
A recent report from CISA (US Cybersecurity and Infrastructure Security Agency) revealed that the APT 28 group was responsible for exploiting Cisco routers with poor maintenance using CVE-2017-6742. CVE-2017-6742 Attack: Reconnaissance with RCE in Cisco SNMP (Simple Network Management Protocol)…
New Google Chrome Zero-Day Bug Actively Exploited in Wide – Emergency Update!
On April 18, 2023, Google released a new update for Chrome Desktop versions with security updates for actively exploited second Chrome zero-day vulnerability that allows attackers to execute an arbitrary code to take complete control of the system remotely. CVE-2023-2136…
3 iOS Zero-Click Exploits Exploited by NSO Group to Deploy Spyware
In 2022, NSO Group, the Israeli firm notorious for its spyware technology, reemerged with a slew of zero-click exploit chains designed for iOS 15 and iOS 16. These sophisticated chains of exploits, targeted at iPhones and iPads, were deployed against…
Ex-Conti and FIN7 Hackers Team Up To Develop Domino Backdoor Malware
The X-Force team at IBM has recently found a new malware family known as “Domino,” made by ITG14, aka FIN7, a notorious group of cyber criminals. ITG23, a Trickbot/Conti gang monitored by X-Force, has been deploying the newly discovered malware,…
ChatGPT Account Takeover Bug Allows Hackers To Gain User’s Online Account
An independent security analyst and bug hunter, Nagli (@naglinagli), recently uncovered a critical security vulnerability in ChatGPT that allow attackers to easily exploit the vulnerability and gain complete control of any ChatGPT user’s account. ChatGPT has become extensively used by…
Used Routers Fully Loaded With Corporate Secrets for Just $100
Researchers at ESET found that hardware on resale in the market consisted of highly confidential information such as IPsec or VPN credentials, hashed root passwords, and much more. Second-Hand sales of computing equipment have been in place ever since the…
Hackers Storing Malware in Google Drive as Encrypted ZIP Files To Evade Detection
Google released the threat horizon report for April 2023, which showed multiple methods used by threat actors for evading security systems. Google’s Cybersecurity Action Team (GCAT) and Mandiant researched a list of techniques and methods used by threat actors over…
Hackers Using Old Nokia 3310 Phone to Start Car Without Key
Recent car thefts have involved technology concealed inside outdated Nokia phones and Bluetooth speakers. This brand-new type of car theft is becoming more prevalent in the US. Criminals use tiny gadgets to interface with the car’s control system, sometimes hidden…
What is Spear Phishing Attack? – Guide for Motives, Techniques & Prevention Methods
Every day tens of thousands of Spear phishing emails are sent to millions of victims around the world. Cyber-attacks have different pathways now; they can strike you from inside or outside, with equal damages across your network. Targeted takedowns could…
DoNot APT Hackers Attack Individuals Using Android Malware via Chatting Apps
CYFIRMA recently detected a cyber-attack on a person living in Kashmir, India, and obtained two malware pieces from the victim’s mobile download folder. The investigation of these samples links the recent cyber-attack to DoNot APT, which has a long-standing record…
Payment Processing Giant NCR Global Hit By Ransomware Attack
NCR, a major player in the US payments industry, admitted it was a target of a ransomware attack for which the BlackCat/Alphv group claimed responsibility. On April 12, NCR revealed that it was looking into an “issue” with its Aloha…
New Android Malware Infecting 60 Google Play Apps with Over 100M Installs
Recently, McAfee’s Mobile Research Team discovered ‘Goldoson,’ a new type of Android malware, has crept into the Google Play store through 60 genuine apps, downloaded by a whopping 100 million users. The sneaky malware component found in all 60 apps…
Hackers Selling ChatGPT Premium Accounts On the Dark Web
As more stolen ChatGPT Premium accounts are traded, cybercriminals can circumvent OpenAI’s geofencing restrictions and gain unrestricted access to ChatGPT, according to Check Point Research (CPR). One of the most thriving markets in the hacker underworld and on the dark…
Western Digital Hack – Attackers Demanding “Minimum 8 Figures” as Ransom
WD (Western Digital), the data storage solutions provider, recently announced a distressing announcement. In a cybersecurity incident, their network suffered a data breach that allowed threat actors to unauthorizedly access data across multiple systems. Threat actors behind the recent cyber…
Lynis – Open Source Security Auditing & Pentesting Tool – 2023
Lynis is an open source security auditing tool. Its main goal is to audit and harden Unix and Linux based systems. It scans the system by performing many security control checks. Examples include searching for installed software and determine possible…
New Google Chrome Zero-day Exploited in Wide – Emergency Update!!
To address the first zero-day vulnerability exploited in assaults since the year’s beginning, Google has published an urgent Chrome security upgrade. Users on the Stable Desktop channel are receiving the updated version, which will gradually become available to all users…
New Google Chrome Zero-day Exploited to Crash Browser – Emergency Update!!
To address the first zero-day vulnerability exploited in assaults since the year’s beginning, Google has published an urgent Chrome security upgrade. Users of the Stable Desktop channel are receiving the updated version, and over the next few days or weeks,…
What is Insider Attacks? : How Prepared Are You?
Insider attacks often catch organizations by surprise because they’re tricky to spot. Banking on reactive solutions like antivirus software or a patch management solution to avoid such attacks is not wise. Understanding what contributes to the increasing number of insider…
European Data Protection Board Creates Task Force to Investigate ChatGPT
On Thursday, the European Data Protection Board (EDPB)announced that it had established a task force on ChatGPT, a potentially significant first step towards a uniform policy on setting privacy regulations for artificial intelligence. “The EDPB decided to launch a dedicated task…
Google New Initiative to Reduce the Risk of Zero-Day Vulnerabilities
Charley Snyder, the Head of Security Policy at Google, has posted a new initiative that will eliminate the risk of vulnerabilities and protect security researchers. In his post, he mentioned, “The security industry has improved in many ways, both in…
Cybercriminals Selling Python-based Hacking Tool via Telegram
Recently, Cado Security Labs discovered and unveiled details of a new Python-based credential harvester called “Legion.” Cybersecurity researchers have asserted that this hacking tool, “Legion” has already made its way to Telegram and is being actively marketed on Telegram by…
Hackers Shifting DDoS Attacks to VPS Infrastructure for Increased Power
Cloudflare released a threat report for DDoS of Q1 2023, showing that cyber threat actors use VPS-based attack vectors instead of compromised IoT (Internet of Things) devices. DDoS is an abbreviation for Distributed Denial of Service attack in which threat…
WhatsApp New Features Protect Users From Unknown Account Take-Over Attacks
WhatsApp recently announced a set of new security features that are intended to ensure more robust privacy and safety for its users. The security policy of WhatsApp is based on the principle that the user’s messages will be protected with…
Building a Network Security Strategy: Complete Checklist To Protect Your Network
Whether you’re a large or small business, network security is something you can’t ignore. Threat actors can and will, infiltrate businesses of any size wreaking havoc on computer systems, maliciously encrypting data, and in some cases completely destroying a company’s…
Wireshark 4.0.5 Released With New Protocol Support
With improved protocol support, various bug fixes, and several enhancements, Wireshark has released version 4.0.5. On March 3, 2023, the most recent version of Wireshark 4.0.4 was made available; this is the second upgrade of this year. The open-source packet analyzer…
Hyundai Hacked – Attackers Stole Car Owners’ Personal Details
Hyundai reported a data breach that impacted car owners in Italy and France and people who booked their test drives. The company has warned that hackers accessed customers’ data. Hyundai owns roughly 3% of the market shares in Italy and…
Kodi Hacked – Attackers Stole the Forum Database
The Kodi Foundation learned that a dump of the Kodi user forum, MyBB software, was being sold on online forums. Kodi is a multi-platform, open-source media player, manager, and streaming suite. It supports a wide range of third-party add-ons, which give users…
MERCURY – A Destructive Operation From Iranian Hackers Wipe Cloud Environments
MERCURY, an Iranian nation-state group, has recently been detected by Microsoft’s Threat Intelligence team operating under the guise of a ransomware attack in hybrid environments. Since 2017, MERCURY has been conducting espionage campaigns against targets in the Middle East, and…
OpenAI Launched Bug Bounty Program – Rewards up to $20,000
It’s been almost half a year since the revolutionary ChatGPT was released. Amazingly, it reached 100 million users in just two months. ChatGPT has an unimaginable potential to answer things that need a lot of research. Due to its increasingly…
The Bot Invasion: Is Your Digital Ad Campaign at Risk?
The rise of digital ad fraud has been a nightmare for businesses and marketers alike. Sophisticated bots can easily imitate human behavior and generate fake clicks, views, and impressions, costing companies millions of dollars in wasted ad spending. Is your…
iPhones Hacked Via iOS Zero-Click Exploit To Deploy Spyware
Microsoft Threat Intelligence experts say a threat group is associated with “QuaDream,” an Israeli-based private sector offensive actor (PSOA). It employed a zero-click exploit called END OF DAYS to compromise the iPhones of high-risk individuals. Reports say QuaDream sells a…
Hackers Using Fake Google Chrome Error Screens To Inject Malware
Researchers detect a new malware campaign that uses a web page with fake Google Chrome error screens, and the campaign actively distributing malware since Feb 2023. With the help of social engineering techniques, threat actors trick victims into executing the…
Pay $20K To Infect Android Devices Via Google Play Store – Darkweb Report
In recent times, it has been observed by the security researchers at Kaspersky’s SecureList that the official Google Play store’s security has become increasingly vulnerable to the schemes of the threat actors. These shady actors have exploited various loopholes to…
Sophos Web Appliance Critical Flaw Let Attacker Execute Arbitrary Code
Sophos has released a new security advisory that has fixed 3 of its significant vulnerabilities, allowing threat actors to execute arbitrary code injection on Sophos Web Appliance (SWA). CVE(s): CVE-2023-1671 – Pre-Auth Command Injection in Sophos Web Appliance CVSS Score:…
Apple Patched Two New Zero-days That Were Exploited to Hack iPhones and macOS
Apple has recently taken swift action to patch two zero-day vulnerabilities that posed a potential threat of exploitation in cyberattacks. The vulnerabilities have been successfully fixed in emergency security updates released by Apple to safeguard its devices, such as iPhones,…
CISA Urges to Fix Backup Exec Bug Exploited to Deploy Ransomware
A new ALPHV (aka BlackCat Ransomware) has been found and tracked under the ID UNC4466. This ransomware affiliate uses Veritas Backup Exec Installations, which are vulnerable to CVE-2021-27876, CVE-2021-27877, and CVE-2021-2787878. However, these CVEs are used for the initial access…
Tesla Employees Shared Sensitive Images of Cameras on Customers‘ Cars
Reuters reported that between 2019 and 2022, groups of Tesla employees secretly shared via internal messaging system occasionally highly intrusive recordings and photographs captured by consumers’ car cameras. A notable statement from Tesla Inc. is that it guarantees the millions…
Hardware Giant MSI Hacked – Ransomware Group Issues Demand
A cyberattack was recently launched on some of the information systems of the multinational Taiwanese technology company Micro-Star International (MSI) Co., Ltd. According to MSI’s statement, the incident was swiftly reported to law enforcement authorities, and recovery efforts have begun.…
Amazon Banned Flipper Zero Pentesting Tool
According to reports, Amazon has stopped selling Flipper Zero, one of the most widely used pentesting tools. Amazon tagged the product as a “card-skimming device” and prohibited its selling on the e-commerce platform. Flipper Zero was one of the best…
A New Weaponized Browser Extension Bypass Two-factor Authentication
A new malware strain known as the cybersecurity analysts at Trustwave SpiderLabs recently discovered Rilide. This new malware is specifically designed to attack web browsers that are built on the Chromium platform, including:- Trustwave SpiderLabs researchers have discovered that Rilide…
Ransomware Gang Leaked 600GB of Data Stolen From Oakland City Servers
The ransomware gang responsible for the February attack on the City of Oakland, California, released a second data dump. The dump consisted of nearly 600 gigabytes of files that contained stolen municipal data, exposing critical information on thousands of employees…
Telegram – New Market Place for Selling Phishing Toolkits & Services
Telegram is becoming an increasingly popular platform for users as well as cyber-criminals. It has become a Mini Dark-web since 2021 when cyber threat actors have been using them. The services these threat actors offer vary from Automation of Phishing,…
Google to Block Android Loan Apps Accessing User Photos, Contacts & Videos
Google plans to restrict apps that offer loans to individuals from accessing confidential user information, including contacts, photos, and videos, to prevent inappropriate behavior from lenders that threaten borrowers. On Wednesday, Google updated its Personal Loans policy for Play Store apps,…
Google Introduces Data Deletion Policy for Android Apps
Google has introduced a new data deletion policy for the Google Play Store with the intention of giving customers more knowledge and control over their in-app data. Because Google wants users to be able to delete their data without reinstalling…
Authorities Seized Most Popular Marketplace for Stolen Credentials
Law enforcement agencies seized the domains for Genesis Market, one of the world’s biggest marketplaces for cyber fraud. Genesis has been connected to millions of financially driven cyber incidents worldwide, from fraud to ransomware attacks. Genesis served as a one-stop shop…
Rorschach – Fastest Encryption Ransomware Ever Found in Ransomware History
Researchers from Checkpoint found a new and previously unknown ransomware variant dubbed “Rorschach” with highly sophisticated features that target U.S. companies. Rorschach ransomware carries technically unique and customized features and one of the fastest ransomware observed by the speed of…
Western Digital Network Breach – Hackers Gained Access to Company Servers
Western Digital (WD), a renowned manufacturer of Scandisk drives, has announced a data breach on its network, resulting in unauthorized access to data on multiple systems by attackers. WD is a company based in the United States that specializes in…
Uber Driver Data Stolen Again From the Servers of Law Firm
Uber faces various cyber attacks that result in the disclosure of employee email addresses, company reports, and information related to IT assets. The servers of Genova Burns, a legal services firm, have been compromised, resulting in the theft of driver…
Tor Project Creates New Privacy-Focused Browser using VPN Layer
The Tor browser guarantees that your communication remains operational through a decentralized network of transfers maintained by volunteers located worldwide. It safeguards your internet connection from prying eyes by preventing any individual from monitoring the websites you visit, shields your…
Grazie Ragazzi – But It’s Not Ferrari Who’s Saying It This Time!
Ferrari’s woes seem to be continuing from F1 tracks to their data. And surprisingly, ransomware today encrypts files as fast as a Ferrari V8 goes from 0 to 60 mph. The current ransomware attack means cybercriminals now have access to…
Super FabriXss Vulnerability in Microsoft Azure SFX Leads to Unauthenticated RCE
New information has surfaced regarding a security flaw patched by Microsoft in Azure Service Fabric Explorer (SFX). The vulnerability had the potential to result in unauthorized remote code execution. The vulnerability has been discovered by the security researchers at Orca…
Winnti APT Hackers Attack Linux Servers With New Malware ‘Mélofée’
The discovery of a novel malware piece targeting Linux servers has been attributed to an unknown Chinese state-sponsored hacking group. ExaTrack, a French security firm, recently reported that the malware in question was named Mélofée. There is a strong link…
Chinese Hackers Using KEYPLUG Backdoor to Attack Windows & Linux Systems
It has been reported by the Recorded Future’s Insikt Group that RedGolf, a Chinese state-sponsored threat actor group, was using a backdoor designed especially for Windows and Linux systems called KEYPLUG to infiltrate networks. As one of the world’s most…
ChatGPT Ready to Write Ransomware But Failed to Go Deep
Our lives are now enriched by the availability of LLMs that are easily accessible on the internet, so we have tools such as the ChatGPT that can help us breathe life into even the most abstract ideas. As a result,…
Spyware Vendors Exploit 0-Days On Android and iOS Devices
The Threat Analysis Group (TAG) of Google unveiled recently that commercial spyware vendors targeted Android and iOS devices using zero-day vulnerabilities patched last year. In November 2022, the first campaign was discovered by security analysts targeting iOS and Android users.…
New WiFi Flaw Let Attackers Hijack Network Traffic
A fundamental security issue in the design of the IEEE 802.11 WiFi protocol standard, according to a technical study written by Domien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef of imec-DistriNet, KU Leuven, allows attackers to deceive access points into exposing…
A Military-Type Explosive Sent Via USB Drive to Detonate When Plug-in To Computer
The Ecuadorian free-to-air television network Ecuavisa recently reported that a USB device was detonated inside an organization’s newsroom. The explosion occurred due to a USB drive the station mailed to a journalist covering the story. In the middle of the…
UK Police Setup Thousands of Fake DDoS-For-Hire Websites
The National Crime Agency (NCA) of the United Kingdom revealed that it had built several fake DDoS-for-hire service websites to track down cybercriminals who use these platforms to attack businesses. Also, this declaration follows the Agency’s decision to designate one of…
Parts of Twitter’s Source Code Leaked Online On GitHub
Recently, Twitter has acknowledged that some of its confidential source code has been exposed on the popular coding platform GitHub. To address this issue, Twitter has sent GitHub a copyright infringement notice. The petition demands GitHub identify the individual who…
Hackers Earned $1,035,000 for Exploiting 27 Zero-Days at Pwn2Own Vancouver
After the finale of Pwn2Own Vancouver 2023, the Masters of Pwn, Synacktiv (@Synacktiv), received $1,035,000 (plus a car) for their amazing achievements and hard work! They received a Tesla Model 3 and 53 points, along with $530,000. The annual computer…
Hackers Exploited Critical Microsoft Outlook Vulnerability To Gain Exchange Server Access
In response to a recent vulnerability identified in Outlook, Microsoft recently published a proper guide for its customers to help them discover the associated IoCs. That Outlook vulnerability in question has been tracked as “CVE-2023-23397” with a CVSS score of…
ChatGPT Exposes Email Address of Other Users – Open-Source Bug
There were a number of users whose email addresses were exposed accidentally by ChatGPT’s website recently. While OpenAI asserted that the cause was a bug in the Redis client open-source library. In ChatGPT, users can browse all their query history…
Hackers Inject Weaponized JavaScript (JS) on 51,000 Websites
Researchers from Unit 42 have been monitoring a widespread campaign of harmful JavaScript (JS) injections. The campaign aims to redirect unsuspecting victims to dangerous content, including adware and fraudulent pages. Websites continue to be infected by this threat in 2023,…
Malicious ChatGPT Chrome Extension Steal Facebook Accounts
Thousands of Facebook accounts have been stolen due to a trojanized version of the legitimate ChatGPT extension for Google Chrome. The trojanized version of the ChatGPT extension managed to gain popularity with more than 9,000 downloads. Cybercriminals replicated the genuine…
Streaming Platform Gaint Lionsgate Exposes Over 37m Users’ Data
Lions Gate Entertainment Corporation, doing business as Lionsgate, exposed users’ IP addresses and data on the content they saw on its movie-streaming service. According to Cybernews analysts, Lionsgate Play, a video streaming service, had exposed user information via an open…
North Korean Hackers Attack Gmail Users With Malicious Chrome Extensions
In a collaborative effort, the German Federal Office for the Protection of the Constitution (BfV) and the National Intelligence Service of the Republic of Korea (NIS) has released a significant cybersecurity advisory. This advisory cautions against the stealthy actions of…
Shell DDoS Malware Attacks Poorly Managed Linux SSH Servers
The ShellBot threat has turned out to be a new type of malware designed to target Linux SSH servers poorly managed as part of a new campaign. As stated in a report published by AhnLab Security Emergency Response Center (ASEC),…
Google to Reduce SSL Certificate Lifespan to 90 Days
Recently, Google declared its plan to reduce the maximum validity for public TLS (SSL) certificates from 398 to 90 days. Under its “Moving Forward, Together” plan, Google intended to limit the maximum public TLS certificate validity to 90 days via…
Hackers Weaponized and Exploited Over 55 Zero-days in Microsoft, Google, and Apple
Mandiant researchers have recently reported that 55 zero-day vulnerabilities were actively exploited in 2022, most against the following brands and their products:- Researchers state that hackers are still targeting zero-day vulnerabilities in malicious campaigns. It has been reported that most…
BFSI Sector at the Forefront of Cyberattacks
In recent years, the BFSI Sector (Banking, Financial Services, and Insurance) has become a primary target for cyber attackers. A 2022 report by IBM revealed that the average cost of a data breach in the financial industry reached a staggering…
Ferrari Hacked – Attackers Gained Access to Company’s IT Systems
A threat actor recently contacted Ferrari S.p.A., an Italian luxury sports car manufacturer headquartered in Maranello, demanding a ransom for access to specific client contact information. The company suffered a significant data breach, and consumers’ personal information may now be…
HinataBot – A New Botnet Could Launch Massive 3.3 Tbps DDoS Attacks
HinataBot The post <strong>HinataBot – A New Botnet Could Launch Massive 3.3 Tbps DDoS Attacks</strong> appeared first on GBHackers – Latest Cyber Security News | Hacker News. This article has been indexed from GBHackers – Latest Cyber Security News |…
NBA Cyber Incident – Fans’ Personal Information Exposed
As a result of a recent data breach, the NBA notified all its fans about the fact that a significant amount of personal information was compromised. While using the information gathered, phishing attacks can be conducted by the threat actors…
Beware of New Trigona Ransomware Attacking Finance and Marketing Industries
The relatively new Trigona ransomware strain, according to Unit 42 researchers, was particularly active in December 2022, targeting industries in the manufacturing, finance, construction, agriculture, marketing, and high technology industries. “Trigona’s threat operator engaging in behavior such as obtaining initial…
Fake Calls Android Malware Attacking Android Users to Steal Banking Details
An Android Trojan dubbed “FakeCalls” was spotted by the Check Point Research team. This malware can pretend to be one of more than 20 financial applications and imitate phone conversations with the bank or financial service employees. This tactic is…
CISA Urgent Warning: Adobe ColdFusion Bug Exploited As A Zero-day in the Wild
CISA has updated its list of security flaws that have been actively exploited, including a critical vulnerability affecting Adobe ColdFusion versions 2021 and 2018. The vulnerability is tracked as (CVE-2023-26360), Adobe ColdFusion Improper Access Control flaw. These flaws provide serious…
US Federal Agency Hacked By Exploiting Telerik Vulnerability in IIS Server
As a result of a joint effort of the CISA, FBI, and MS-ISAC, a public advisory was published recently. This public advisory claims that between November 2022 and the beginning of January 2023, attackers gained access to the server of…
A Ransomware Gang Claims to Have Hacked the Security Camera Company Amazon Ring
There has been a recent cyber attack on Amazon’s popular security camera company, Ring, which was attributed to a ransomware group ALPHV that uses the BlackCat malware. This group has now claimed responsibility for the attack and is now threatening…
OpenAI Announces GPT-4, the Successor of ChatGPT
A powerful new AI model called GPT-4 has been released recently by OpenAI, which is capable of comprehending images and texts. The company describes this as the next-stage milestone in its effort to scale up deep learning. In November 2022,…
Threat Actors Deliver Malware Using AI-Generated Youtube Videos
The cybersecurity analysts at cloudSEK recently asserted that monthly YouTube videos containing links to stealer malware, such as Vidar, RedLine, and Raccoon, have increased by 200-300% since November 2022. These videos are supposed to be tutorials; however, it has been…
Fake ChatGPT Chrome Extension with Thousands of Installs Steal Facebook Logins
Guardio Labs discovered a Chrome Extension that promotes rapid access to fake ChatGPT functionality capable of stealing Facebook accounts and establishing hidden account backdoors. Using a maliciously imposed Facebook app “backdoor” that grants the threat actors super-admin powers stands out.…
Kali Linux 2023.1 Released With Tools for Blue and Purple Teams
Offensive security released Kali Linux 2023.1 with new tools for purple and blue teamers for defensive security. On March 13th Kali Linux penetration distro completed 10 years of providing amazing services to the cyber security community. On celebrating its 10th…
New CASPER Attack Steals Data from Air-gapped Computers Using Internal Speakers
Researchers from the Korea University School of Cyber Security, Seoul, have recently presented a new covert channel attack known as CASPER, which has been developed as part of a research project that is currently in progress. In addition to this,…
Data Security With Cloud Compliance: Meeting Regulations & Standards
Businesses from all industries are aware of the benefits of cloud computing. Some organizations are just getting started with migration as part of digital transformation initiatives, while others are implementing sophisticated multi-cloud, hybrid strategies. However, data security in cloud computing…
New Version of Xenomorph Android Malware Attacks 400 Banks Customers
As per the latest findings of ThreatFabric, a version of the Android banking trojan with the name Xenomorph has been discovered in the wild as a new variant of the trojan. Mobile banking has been gaining a lot of attention…
IceFire Ransomware Attacks Both Windows and Linux Enterprise Networks
Recently, security analysts at SentinelOne got to know about an infamous IceFire ransomware that has been found attacking both Windows and Linux enterprise networks. An IceFire ransomware attack encrypts the files of the victim and demands payment in exchange for…
Record Breaking DDoS Attack – 158.2 Million Packets Per Second
When a DDoS attack is conducted, the server being targeted receives a large number of garbage requests. As a result, the server’s capacity is depleted, and a large number of garbage requests are being sent. As Akamai reported recently, one…