Category: GBHackers

Security Updates
25
Apr
2024

New PowerShell Script Tracer_ Analyze PowerShell Execution

Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch various attacks. PowerShell scripts can download…

Cyber Attack Defenders Up For Battle
25
Apr
2024

Beware! Zero-click RCE Exploit for iMessage Circulating

A new cybersecurity threat has emerged as a zero-click remote code execution (RCE) exploit targeting Apple’s iMessage service is reportedly…

Cyber Attack Defenders Up For Battle
25
Apr
2024

New DragonForce Ransomware Emerged From The Leaked LOCKBIT Builder

Hackers exploit LOCKBIT Builder due to its versatility in creating customized ransomware payloads which enable them to tailor attacks to…

Cyber Attack Defenders Up For Battle
25
Apr
2024

JudgeO Online Code Editor Flaw Let Attackers Execute Code

A critical flaw has been identified in the popular online code editor, JudgeO. If exploited, this vulnerability could allow attackers…

Cyber Attack Defenders Up For Battle
25
Apr
2024

Pakistani APT Hackers Attacking Indian Govt Entities

Cybersecurity experts at Seqrite Labs have reported a surge in cyberattacks against Indian government entities. These attacks have been attributed…

Security Updates
25
Apr
2024

Cyber Attack Defenders Up For Battle : Huge Uptick In Detections

Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised systems. This is achieved by targeting…

Cisco Firewall Zero-Days
25
Apr
2024

Cisco Releases Critical Security Updates to Fix Firewall 0-Days

Cisco has released critical security updates to address multiple vulnerabilities in its Adaptive Security Appliance (ASA) devices and Firepower Threat…

Cisco Firewall Zero-Days
25
Apr
2024

Authorities Warned that Hackers Are Exploiting Flaws

In a joint advisory released by cybersecurity agencies across Canada, Australia, and the United Kingdom, IT professionals and managers in…

MySQL2 Flaw Vulnerability
25
Apr
2024

Hackers Exploit Cisco Firewall Zero-Days to Hack Government Networks

Security researchers at Cisco Talos have uncovered a sophisticated cyber espionage campaign dubbed “ArcaneDoor” conducted by a state-sponsored threat actor…

Multiple MySQL2 Flaw Let Attackers Arbitrary Code Remotely
24
Apr
2024

Multiple MySQL2 Flaw Let Attackers Arbitrary Code Remotely

The widely used MySQL2 has been discovered to have three critical vulnerabilities: remote Code execution, Arbitrary code injection, and Prototype…

MySQL2 Flaw Vulnerability
24
Apr
2024

Phishing Attacks Rise By 58% As The Attackers Leverage AI Tools

AI-powered generative tools have supercharged phishing threats, so even newbie attackers can effortlessly create refined, individualized campaigns. Protecting data and…

CoralRaider Hacker Evade Antivirus Detections Using LNK File
24
Apr
2024

CoralRaider Hacker Evade Antivirus Detections Using LNK File

This campaign is observed to be targeting multiple countries, including the U.S., Nigeria, Germany, Egypt, the U.K., Poland, the Philippines,…