Category: GBHackers

ErrorFather Hackers Attacking Android Users To Gain Remote Control
15
Oct
2024

ErrorFather Hackers Attacking Android Users To Gain Remote Control

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to target financial and social media apps,…

HORUS Protector Delivering AgentTesla, Remcos, Snake, Malware
15
Oct
2024

HORUS Protector Delivering AgentTesla, Remcos, Snake, Malware

The Horus Protector crypter is being used to distribute various malware families, including AgentTesla, Remcos, Snake, NjRat, and others, whose…

Fortigate SSLVPN Vulnerability exploited-in-the-wild
15
Oct
2024

Fortigate SSLVPN Vulnerability exploited-in-the-wild

A critical vulnerability in Fortinet’s FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in the wild. This format string flaw…

Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Remote Code
15
Oct
2024

Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code

Splunk has disclosed multiple vulnerabilities affecting its Enterprise product, which could allow attackers to execute remote code. These vulnerabilities, primarily…

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address
14
Oct
2024

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies and connecting to various IP addresses….

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details
14
Oct
2024

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on critical infrastructure in the UAE and…

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs
14
Oct
2024

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further investigation, where researchers have identified 40…

Beware of Fake AI Scam Calls that Takeover Your Gmail Account
14
Oct
2024

Beware of Fake AI Scam Calls that Takeover Your Gmail Account

Scammers use sophisticated AI technology to impersonate tech giants like Google, aiming to take over unsuspecting users’ Gmail accounts. A…

pac4j Java Framework Vulnerable to RCE Attacks
14
Oct
2024

pac4j Java Framework Vulnerable to RCE Attacks

A critical security vulnerability has been discovered in the popular Java framework pac4j. The vulnerability specifically affects versions before 4.0…

Zendesk Email Spoofing Flaw Let Attackers Access Support Tickets
14
Oct
2024

Zendesk Email Spoofing Flaw Let Attackers Access Support Tickets

A security vulnerability in Zendesk, a widely used customer service tool, has been uncovered. This flaw allowed attackers to access…

18 Individuals Charged for Widespread Manipulation Cryptocurrency Markets
14
Oct
2024

18 Individuals Charged for Widespread Manipulation Cryptocurrency Markets

18 individuals and entities have been charged with widespread fraud and manipulation within the cryptocurrency markets. The charges, unsealed in…

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication
11
Oct
2024

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, which is designed…