Category: GBHackers

PixieFAIL
22
Jan
2024

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks

Memcyco will showcase its solutions at Deloitte’s annual Cyber iCON event, demonstrating how organizations can build effective defenses to protect…

Webinar
22
Jan
2024

Beware of Pirated MacOS Apps That Install’s Chinese Malware

Similar to ZuRu malware, a new malware has been found embedded in pirated macOS applications, which downloads and executes several…

Webinar
22
Jan
2024

DarkGate Malware Abuses AutoIT Scripting Payload Obfustication

DarkGate is a type of malware that employs Auto-It compiled loaders that cause a considerable threat because of its advanced evasion strategies and persistence…

Webinar
21
Jan
2024

New Outlook Flaw Let Attackers Access Hashed Passwords

A new Outlook vulnerability that can be used to extract NTLMv2 hashes by exploiting Outlook, Windows Performance Analyzer (WPA), and…

Webinar
20
Jan
2024

9 UEFI Flaws Expose Computers to Remote Attacks

Hackers exploit UEFI flaws to gain unauthorized access to a system’s firmware, enabling them to implant persistent malware or manipulate…

Webinar
19
Jan
2024

CISA & FBI released Incident Response Guide for WWS Sector

Malicious cyber incidents, such as ransomware and unauthorized access, have affected the Water and Wastewater Sector (WWS) in the past…

Webinar
19
Jan
2024

New Sophisticated NFT Airdrop Attack Steals Funds

The allure of NFTs, those shimmering digital tokens holding unique artworks and promises of fortune, has captivated the world.  But…

Webinar
19
Jan
2024

FBI & CISA Warns of Critical Infrastructure Risk by Chinese Drones

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have raised a red flag: Chinese-made…

Webinar
19
Jan
2024

170,000+ Android TVs Hacked by Bigpanzi Bot to Launch DDoS

Android TVs are widely used, and due to their wide adoption, threat actors frequently target them for unauthorized access or…

Webinar
19
Jan
2024

A Tool For Open-source Investigations

OSINVGPT is an AI-based system that helps security analysts with open-source investigations and tool selection. While this tool was developed…

Webinar
18
Jan
2024

Multichain Inferno Drainer Abuse Web3 Protocols

A cryptocurrency-related phishing scam that uses malware called a drainer is one of the most widely used tactics these days. From…

Android Malware Masquerades as Chrome Browser
18
Jan
2024

How Do You Protect Your APIs From DDoS Attacks?

Today, DDoS attacks stand out as the most widespread cyber threat, extending their impact to APIs.  When successfully executed, these…