Silver is an open-source command-and-control framework that is becoming increasingly popular among malicious actors at current attacks. As threat actors are opting for this option since it offers a viable alternative to commercial tools such as:- Designed with scalability in…
Tag: GBHackers – Latest Cyber Security News | Hacker News
What is XDR, MXDR, DRs & SBOM ? – Cybersecurity Acronyms 2023
The field of cybersecurity is rife with acronyms. From AES to VPN, these technical alphabet soup terms have been part of the knowledge of not only cybersecurity experts but also organizations that are planning to buy security solutions or implement…
Chinese Hackers Exploit FortiOS Zero-Day Vulnerability to Deploy New Malware
Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN that had only recently been discovered, and marked as a zero-day exploit, in December. The hackers targeted both a government organization in Europe…
ChatGPT Can Be Used to Create Dangerous Polymorphic Malware
The cybersecurity experts at CyberArk have provided information on the mechanism by which the ChatGPT AI chatbot can produce a new strain of polymorphic malware. Polymorphic malware could be easily made using ChatGPT. With relatively little effort or expenditure on…
10 Best Free Firewall Software – 2023
In this article, we have done a depth analysis and listed your top 10 best Free Firewall software that provided extended security to protect your system from bad actors. Generally, every computer is connected to the internet and is susceptible…
Cisco Unified CM SQL Injection Flaw Let Attackers Execute Crafted SQL Queries
Cisco released fixes for Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition to address high-severity SQL injection vulnerability. “An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL…
PayPal Data Breach – Over 35,000 Users’ Accounts Compromised
PayPal has recently begun sending out notifications to thousands of users who were affected by a data breach. The breach occurred due to credential stuffing attacks, which allowed unauthorized access to user accounts. As a result of these attacks, some…
Hackers Actively Exploiting Critical ManageEngine Vulnerability
Rapid7 is taking action in response to several instances of compromise caused by the exploitation of CVE-2022-47966, which is a pre-authentication remote code execution (RCE) vulnerability. This vulnerability affects nearly 24 on-premise ManageEngine products, and it is a serious threat…
PayPal Data Breach – Over 35000 Thousand Users’ Accounts Compromised
PayPal has recently begun sending out notifications to thousands of users who were affected by a data breach. The breach occurred due to credential stuffing attacks, which allowed unauthorized access to user accounts. As a result of these attacks, some…
Beware of the New ‘Blank Image’ Attack that Hides Malicious Scripts in Image Files
Avanan researchers have seen a new attack dubbed “Blank Image” spreading throughout the globe wherein hackers include blank images in HTML attachments. When opening the attachment, the user is automatically redirected to a malicious URL. This email campaign begins with…
Hackers Steal Data from KFC, Pizza Hut, Taco Bell & Habit Burger
A ransomware attack targeted Yum! Brands on January 18, 2023, caused the closure of 300 locations of its fast food chains KFC, Pizza Hut, Taco Bell, and The Habit Burger Grill in the United Kingdom. In addition to operating over…
T-Mobile Hacked – Over 37 Million Customer Data Exposed
T-Mobile US, Inc. discovered that a malicious attacker was illegally accessing data through a single Application Programming Interface (“API”). The research revealed that the threat actors accessed information for about 37 million active postpaid and prepaid customer accounts using this API,…
TOP 10 Deep Web Search Engine Alternatives for Google and Bing – 2023
A Deep Web Search Engine is an alternative search engine when we need to search for something, then Google or Bing will be the first choice hit in mind suddenly. Here is the deep web search engine list. But unlike…
TOP 10 Deep Web Search Engine Alternatives for Google and Bing 2023
A Deep Web Search Engine is an alternative search engine when we need to search for something, then Google or Bing will be the first choice hit in mind suddenly. Here is the deep web search engine list. But unlike…
Common Browser Security Vulnerabilities Used By Hackers To Take Over Browser
While using web browsers, there are security threats that, if not careful, can allow cybercriminals to take over the browser and steal information. To ensure browser security for enterprises and individuals, steps must be taken to keep cyber criminals away.…
Hackers Abuse GitHub Codespaces Feature to Host and Deliver Malware
Trend Micro researchers have recently demonstrated that malware and malicious scripts can be hosted and distributed within GitHub Codespaces by malicious actors through the use of port forwarding functionality. GitHub Codespaces allows developers to quickly set up a workspace and…
Modern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure
In earlier years, everyone depends on SOC (including firewalls, WAF, SIEM,etc.) and the priority in building the SOC provides security and the CIA was maintained. However, later the emergence of the attacks and the threat actors becomes more challenging and…
Modern CyberSOC – A Brief Implementation Of Building a Collaborative Cyber Security Infrastructure
In earlier years, everyone depends on SOC (including firewalls, WAF, SIEM,etc.) and the priority in building the SOC provides security and the CIA was maintained. However, later the emergence of the attacks and the threat actors becomes more challenging and…
Over 4,000 Internet-facing Sophos Firewalls Vulnerable to Code Injection Attacks
The Sophos Firewall Webadmin and User Portal HTTP interfaces are vulnerable to unauthenticated and remote code execution, as stated in an alert released by Sophos in September. The vulnerability, CVE-2022-3236, was reportedly utilized against “a small collection of specific organizations,…
GitLab Critical Security Flaw Let Attacker Execute Arbitrary Code
GitLab has released fixes for two security flaws in Git that are of critical severity and might allow attackers to remotely execute arbitrary code and take advantage of integer overflows. The flaws, identified as CVE-2022-41903 and CVE-2022-23521, were patched in…
Wireless Penetration Testing Checklist – A Detailed Cheat Sheet
Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses the Weakness, technical flows, and Critical wireless Vulnerabilities. The most important countermeasures we should focus on are Threat Assessment, Data…
Over 6000 Internet-Exposed Cacti Servers are Unpatched for Critical Security Vulnerability
A significant number of servers that use the Cacti software, and are connected to the internet, have not been updated to fix a security vulnerability that is currently being actively exploited by attackers. According to Censys, a platform for managing…
Hackers Compromised CircleCI Employee’s Laptop to Breach the Company’s Systems
CircleCI, a DevOps platform, discovered that malware installed on a CircleCI engineer’s laptop was used by an unauthorized third party to steal a legitimate, 2FA-backed SSO session. On December 16, 2022, this device was compromised. The company’s antivirus programme was…
Norton Password Manager Breached – Hackers Accessed Username and Password
Customers were notified by NortonLifeLock – Gen Digital that accounts for Norton Password Manager had been successfully breached. They made it clear that the breach was targeted at user accounts rather than the company system. According to the letter given…
Most Important Network Penetration Testing Checklist
Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall…
FortiOS SSL-VPN Zero-day Flaw Exploited to Attack Government Organizations
There have been a number of attacks against government organizations and government-related targets using FortiOS SSL-VPN zero-day vulnerabilities patched by Fortinet last month that have been exploited by unknown attackers. A security flaw (CVE-2022-42475) was exploited in these incidents to…
SymStealer Vulnerability Let Attacker Steal Login Credentials from Google Chrome
The SymStealer vulnerability CVE-2022-3656, newly disclosed by the Imperva Red Team, affects over 2.5 billion users of Google Chrome and Chromium-based browsers. Reports say sensitive files, including cloud provider user credentials and crypto wallets, might have been stolen due to…
Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide
Like an Intrusion detection system (IDS), an Intrusion prevention system (IPS) screens network traffic. In this article, we deep dive into Intrusion Prevention System architecture. An Intrusion Prevention System (IPS) is a framework that screens a network for evil exercises,…
Protecting Your Cloud Environments With Zero Trust
When moving to a cloud infrastructure, businesses should be looking toward a Zero Trust strategy. This security model protects the cloud from the inside out using the principle of least privilege to grant secure access to any company resource. Eliminating…
Microsoft Exchange Vulnerabilities Most Exploited by Hackers Targeting Financial Sector
During the month of November, researchers at the cybersecurity firm LookingGlass examined the most significant vulnerabilities in the financial services industry in the United States. The company looked at assets with public internet-facing assets from more than 7 million IP addresses…
Hackers Selling Telegram Insider Server Access on Dark Web Forums
SafetyDetectives’ cybersecurity researchers came across a dark web marketplace that claims to provide consumers with access to Telegram’s internal server for the price of $20,000. The seller claims that the price is non-negotiable and includes uninterrupted access to Telegram servers through…
Microsoft Patch Tuesday – 98 Flaws Patched Including the One Exploited in the Wild
A total of 98 vulnerabilities were fixed on January Patch Tuesday 2023 by Microsoft, including a zero-day vulnerability that was exploited actively, and a handful of other weaknesses. This Patch Tuesday 2023 marks the first of the year, and it…
Default Setup – A New Option to Set Up Code Scanning on GitHub
The GitHub code scanning feature has been enhanced with a new option called “default setup,” designed to assist developers in setting up code scanning with only a few clicks and make it easier to configure it automatically. GitHub’s code scanning…
Hackers Use Text-to-SQL Attacks to Break into Your Databases
Recently, a group of researchers successfully demonstrated a new type of attack that utilizes Text-to-SQL models in order to generate malicious code. The most astonishing thing about this malicious code is, it’s enough potential to obtain sensitive information and launch…
Microsoft Details Techniques Used by Hackers to Deliver Ransomware to macOS Devices
One of the most dominating threats in the current cyberspace era is ransomware which is constantly affecting organizations of all sizes. In order to cast a wider net of potential targets, attackers are constantly changing their tactics and expanding their…
Top 10 Best Penetration Testing Companies & Services – 2023
Penetration Testing Companies are pillars when it comes to information security, nothing is more important than ensuring your systems and data are safe from unauthorized access, Many organizations have a flawed security culture, with employees motivated to protect their own…
Dridex Malware Targeting macOS Platform Using New Entry Method
By using email attachments that resemble regular documents, a variant of Dridex (aka Bugat and Cridex), which is a banking malware is spreading to others through macOS. Prior to now, the malware had been targeting Windows, but now it has…
10 Best Vulnerability Scanner Tools For Penetration Testing – 2023
A Vulnerability Scanner Tools is one of the essential tools in IT departments Since vulnerabilities pop up every day and thus leaving a loophole for the organization. The Vulnerability scanning tools help in detecting security loopholes in the application, operating…
Blind Eagle Hacker Group Launching Indiscriminate Attacks Using Powerful Toolset
There have been reports that an organized threat actor, known as Blind Eagle (tracked as APT-C-36), has re-appeared again with a refined toolset and one of the most elaborate infection chains in the history of cyberattacks targeting Colombian and Ecuadorian…
Best Malware Analysis Tools List For Security Researchers & Malware Analyst 2023
Malware analysis tools are highly essential for Security Professionals who always need to learn many tools, techniques, and concepts to analyze sophisticated Threats and current cyber attacks. Malware Analysis Tools & Courses Malware Analysis Courses Here we have listed the best…
Best Malware Analysis Tools List For Security Researchers & Malware Analyst 2022
Malware analysis tools are highly essential for Security Professionals who is always need to learn many tools, techniques, and concepts to analyze sophisticated Threats and current cyber attacks. Here we are going to see some of the Malware Analysis Tools…
Spynote Android Malware Targeting Financial Institutions to Steal Sensitive Information
Since October 2022, a new version of Android malware known as SpyNote (aka SpyMax) has been targeting financial institutions as a means of stealing information. It is interesting to note that this new version incorporates both the characteristics of spyware…
WhatsApp Adds Proxy Support For Users to Help Bypass Internet Restrictions
WhatsApp Proxy support is now available to all WhatsApp users worldwide, giving them the ability to continue using the app even if their connection is banned or otherwise disrupted. “We’re launching proxy support for WhatsApp users all over the world.…
CybeReady Named a Representative Provider in 2022 Gartner® Innovation Insight on Security Behavior
CybeReady, provider of the world’s fastest security awareness solution, is honored to be named as a Representative Provider in the 2022 Innovation Insight on Security Behavior and Culture Program Capabilities Report by Gartner1. Leveraging a fully-managed solution, CybeReady has helped…
Researchers Claim That RSA Algorithm Can Be Broken by Quantum Computers
It was recently reported that Chinese researchers had made a breakthrough in the field of quantum computing. A quantum computer with around the same power as what will soon be available to the general public has been designed to break…
Volvo Cars Suffered A New Data Breach? Data Published On Hacking Forum
According to a post on a well-known hacker forum, Volvo Cars has experienced a new data breach, with stolen information allegedly being made available for sale. Anis Haboubi, a French cybersecurity expert, was the first to discover that a threat…
Can Open Source Security Prevent Zero-Day Attacks?
A zero-day (or zero-day) vulnerability is a software security risk that is not known to the software vendor or user. A zero-day attack is an attempt by an attacker to gain access to a vulnerable system. This is a serious…
Over 60,000 Online Exchange Servers Unpatched for RCE Vulnerability ProxyNotShell
One of the two security flaws targeted by ProxyNotShell exploits, CVE-2022-41082 RCE vulnerability, has not been patched on more than 60,000 Microsoft Exchange servers, as a result, they are exposed online. Another flaw that is in question has been tracked…
Toyota Discloses Data Breach – Customers’ Personal Information Exposed
Toyota Motor Corporation reveals a data breach that may have compromised the personal information of its customers after an access key was made available to the public on GitHub for over five years. The data breach at Toyota Kirloskar Motor,…
Top 10 Open Port Scanner and Port Checker Tools for 2023
Port scanners and port checker tools are the most essential parts of finding the open ports and the status of the port. The open ports mean a TCP or UDP port number that is arranged to acknowledge packets. Web pages…
Lockbit Ransomware Group Apologized For the Attack On Hospital for Sick Children
Following the hospital’s breach in the middle of December, the LockBit ransomware group has expressed regret and given it a free decryption key. The Hospital for Sick Children (SickKids) in Toronto was the target of a ransomware attack on December…
RedThief Hacker Group Targeting Students in The U.K. to Steal Financial Data
In an activity dubbed RedThief (aka RedZei), Chinese-speaking scammers have been targeting Chinese international students in the UK for more than a year. There have been numerous reports of scammers calling from a UK phone number once or twice a…
Google Home Smart Speaker Flaw Let Attackers Spy on User Conversations
The Google Home smart speaker was hacked recently by a security analyst (Matt Kunze) who found that there is a flaw that could allow hackers to install a backdoor on it. This could enable threat actors to spy on the…
Linux Malware Exploit Over 30 Vulnerabilities in WordPress Themes & Plugins
In an attempt to inject malicious JavaScript into WordPress plugins and themes that are outdated, a previously detected Linux malware that is unknown has been found exploiting 30 vulnerabilities. The targeted website is injected with malicious JavaScript code if any…
Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide
Like an intrusion detection system (IDS), an intrusion prevention system (IPS) screens network traffic. An Intrusion Prevention System (IPS) is a framework that screens a network for evil exercises, for example, security dangers or policy compliance. Vulnerability exploits normally come…
Triple Extortion Ransomware: How to Protect Your Organization?
Ransomware strikes businesses every 11 seconds. The ransomware attack volume is already at record levels, but we’re hearing it’s only getting worse. As some victims managed to take precautions and refused to pay the ransom, attackers began to add more…