Category: GBHackers

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication
11
Oct
2024

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, which is designed…

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks
10
Oct
2024

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months through automated defense and proactive prevention….

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution
10
Oct
2024

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading Investigations solution used by CTI teams,…

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks
10
Oct
2024

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being actively exploited in cyberattacks. With a…

Wireshark 4.4.1 Released – What’s New!
10
Oct
2024

Wireshark 4.4.1 released, What’s new!

Wireshark, the world’s leading network protocol analyzer, has just released version 4.4.1, bringing a host of bug fixes and updates…

Hackers Exploiting zero-day Flaw in Qualcomm Chips to Attack Android Users
10
Oct
2024

Hackers Exploiting zero-day Flaw in Qualcomm Chips to Attack Android Users

Protect Websites & APIs from Malware Attack Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations,…

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code
10
Oct
2024

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability was found in Foxit PDF Reader,…

Multiple VMware NSX Vulnerabilities Let Attackers Gain Root Access
10
Oct
2024

Multiple VMware NSX Vulnerabilities Let Attackers Gain Root Access

VMware has disclosed multiple vulnerabilities in its NSX product line that could potentially allow attackers to gain root access. The…

CISA Added Fortinet & Ivanti vulnerabilities that Exploited in the Wild
10
Oct
2024

CISA Added Fortinet & Ivanti vulnerabilities that Exploited in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities Catalog, adding critical vulnerabilities from Fortinet…

Hackers Breached Japan Aerospace Company’s President Account
09
Oct
2024

Hackers Breached Japan Aerospace Company’s President Account

Hackers have infiltrated the Japan Aerospace Exploration Agency (JAXA), compromising the accounts of several high-ranking officials, including President Hiroshi Yamakawa….

Dark Angels Ransomware Attacking Windows And Linux/ESXi Systems
09
Oct
2024

Dark Angels Ransomware Attacking Windows And Linux/ESXi Systems

The sophisticated ransomware group Dark Angels, active since 2022, targets large companies for substantial ransom payments by employing third-party ransomware…

Chrome Security Update, Patched for High-Severity Vulnerabilities
09
Oct
2024

Chrome Security Update, Patched for High-Severity Vulnerabilities

Google has rolled out a new update for its Chrome browser, addressing several high-severity security vulnerabilities. The Stable channel has…