Category: GBHackers

Nim-Based Malware Word Document
27
Dec
2023

Hackers Stolen Over $58 Million Crypto Via Malicious Google Ads

Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been…

Malicious Google and X Ads
27
Dec
2023

Possible Data Exfiltration by Hackers

Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating…

Android Malware Actively Infecting Devices
27
Dec
2023

Nim-Based Malware Delivered via Weaponized Word Document

Hackers use weaponized Word documents to deliver malicious payloads through social engineering.  By embedding malware or exploiting vulnerabilities in these…

Protect Your APIs from Bot Attacks
26
Dec
2023

Android Malware Actively Infecting Devices to Take Full Control

Android malware infects devices to take full control for various illicit purposes like:-  Stealing sensitive information Generating unauthorized financial transactions…

Protect Your APIs from Bot Attacks
26
Dec
2023

Cisco to Acquire Multi-Cloud Network & Security Startup Isovalent

In a strategic move destined to fortify its dominance in the ever-evolving realm of cloud security, Cisco has officially declared…

How Do You Protect Your APIs from Bot Attacks?
26
Dec
2023

How Do You Protect Your APIs from Bot Attacks?

Organizations face an escalating threat of bot attacks in the rapidly evolving digital landscape. As revealed in our latest AppSec…

Hackers Exploiting Old Microsoft Office RCE Flaw
26
Dec
2023

Hackers Attacking Linux SSH Servers to Deploy Scanner Malware

Hackers often target Linux SSH servers due to their widespread use in hosting critical services, and the following loopholes make…

Hackers Exploiting Old Microsoft Office RCE Flaw
23
Dec
2023

Intellexa Spyware Adds Persistence with iOS or Android Device

In the shadowy realm of commercial spyware, the spotlight turns to the notorious Intellexa spyware and its Predator/Alien solution, as…

Hackers Exploiting Old Microsoft Office RCE Flaw
23
Dec
2023

Operation RusticWeb Using PowerShell Commands to filtrate Doc

Hackers use PowerShell commands because they provide a powerful scripting environment on Windows systems, allowing them to stealthily execute malicious…

Hackers Exploiting Old Microsoft Office RCE Flaw
22
Dec
2023

JaskaGO Malware Attacking Windows and macOS Systems

Due to the widespread use and popularity of Windows and macOS, threat actors often target these platforms.  Windows is a…

HCL Ransomware Attack
22
Dec
2023

Hackers Exploiting Old Microsoft Office RCE Flaw

It has been reported that malicious individuals are utilizing a malware called Agent Tesla to target Microsoft Office users using…

HCL Ransomware Attack
21
Dec
2023

New OilRig Downloaders Abusing Microsoft Cloud APIs

Threat actors engage in cyberespionage to gain the following advantages:- Strategic Political Economic Military Hackers do so by stealing the…