Category: GBHackers

Webinar
09
Feb
2024

Chinese Hackers Exploiting VMware 0-Day Flaw Since 2021

Mandiant and VMware recently uncovered a sophisticated cyber espionage campaign. The attackers, a Chinese group identified as UNC3886, leveraged a…

Webinar
09
Feb
2024

U.S. Offers $10 Million Reward for Info on Hive Ransomware

The United States State Department has recently revealed a $10 million reward for any valuable information that could lead to…

Webinar
09
Feb
2024

Researchers Use Raspberry Pi Pico to Crack BitLocker

BitLocker is a computer program provided by Microsoft that users can use to encrypt their entire volumes, preventing unauthorized access…

Webinar
08
Feb
2024

Critical Cisco Expressway Flaw Let Remote Execute Arbitrary Code

Cisco released patches to address multiple vulnerabilities in the Cisco Expressway Series that might allow an attacker to do arbitrary…

Webinar
08
Feb
2024

Beware of Facebook Ads That Delivers Password-Stealing Malware

A new malware called Ov3r_Stealer was found to be intended for stealing cryptocurrency wallets and passwords and then sending them to a…

Webinar
07
Feb
2024

Over 28,000 Ivanti Instances Exposed to Internet

Ivanti has disclosed two new zero-day vulnerabilities assigned with CVE-2024-21888 and CVE-2024-21893 in the products Ivanti Connect Secure and Ivanti…

Webinar
07
Feb
2024

INTERPOL Uncovers 1,300+ Servers Used as Launchpads

A recent massive operation by INTERPOL, which happens to be the biggest international police organization in the world, has successfully…

Webinar
07
Feb
2024

TeamCity Authentication Bypass Flaw to Gain Admin Control

A critical security vulnerability was detected in TeamCity On-Premises, tagged as CVE-2024-23917, with a CVSS score of 9.8. An unauthenticated attacker…

Webinar
07
Feb
2024

DiceLoader Malware Used to Attack Corporate Business

An intrusion set called FIN7 has been known to be operating since 2015 and is composed of Russian-speaking members. This…

How to Extract Malware Configurations in a Sandbox
06
Feb
2024

How to Extract Malware Configurations in a Sandbox

Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source…

Webinar
06
Feb
2024

Cloudflare Server Compromised Due to Leaked Access Token

On November 23, 2023, Cloudflare detected a threat actor on the self-hosted Atlassian server. The attack was initiated using a…

Webinar
06
Feb
2024

Researchers Unvield the Sophisticated Ransomware by Black Hunt

The Black Hunt ransomware has recently become a significant threat to the cybersecurity landscape. This malicious software has already wreaked…