Category: GBHackers

Pure Malware Tools Masquerade As Legitimate Software to Bypass Detections
25
Jan
2024

Pure Malware Tools Masquerade As Legitimate Software to Bypass Detections

An extensive examination of the growing danger posed by the Pure malware family has been released, providing the industry with…

Webinar
25
Jan
2024

Kasseika Ransomware Exploits Driver Functionality to Kill Antivirus

Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware…

Webinar
25
Jan
2024

Hackers Targeting Indian Users with Fake Android Loan Apps

Hackers in India are using fake loan applications to target Android users to take advantage of the rising demand for…

Webinar
24
Jan
2024

Beware of Weaponized Office Documents that Deliver VenomRAT

Since office documents are often used in business communications, hackers take advantage of this fact to disseminate malicious malware easily….

Webinar
24
Jan
2024

Hackers Deploy Malicious npm Packages to Steal SSH Key

Two malicious npm packages were discovered on the npm open source package manager, which leverages GitHub to store stolen Base64-encrypted…

Webinar
24
Jan
2024

Hackers Use SYSTEMBC Tool to Maintain Access

To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…

Webinar
24
Jan
2024

VexTrio a hub of Cyber attacks Massive Criminal Affiliate Chain

VexTrio, a cybercrime syndicate with a history dating back to at least 2017, has been implicated in nefarious activities utilizing…

Webinar
24
Jan
2024

MavenGate Attack Let Attackers Hijack Java & Android Apps

Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the…

Webinar
24
Jan
2024

Parrot TDS Injecting Malicious Redirect Scripts

In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…

Webinar
23
Jan
2024

North Korean Hackers Attacking Cybersecurity Professionals

Hackers target cybersecurity professionals as successfully compromising their systems or gaining access to their credentials provides a gateway to valuable…

Webinar
23
Jan
2024

Malware Hidden In PyPI Packages Attacking Windows Machines

A PyPI malware author identified as “WS” was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting…

Webinar
23
Jan
2024

SEC X Account was Hacked Using SIM Swapping Method

In a brazen act of digital deception, the U.S. Securities and Exchange Commission’s (SEC) official Twitter account, @SECGov, was compromised…