Category: GBHackers

Hackers Using Weaponized Invoice
01
Dec
2023

Hackers Install Antivirus to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in…

Hackers Using Weaponized Invoice
01
Dec
2023

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and…

Hackers Using Weaponized Invoice
01
Dec
2023

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially…

Zyxel Command Injection Flaws
30
Nov
2023

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. …

Zyxel Command Injection Flaws
30
Nov
2023

US Seized Crypto Currency Mixer used by North Korean Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group…

Zyxel Command Injection Flaws
30
Nov
2023

CISA Warns Exploitation Wastewater System Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded…

Zyxel Command Injection Flaws
30
Nov
2023

North Korean Hackers Attacking macOS Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code. All these documents…

Popular Websites weak passwords
30
Nov
2023

Zyxel Command Injection Flaws Let Attackers Run OS Commands

Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor…

Sixth Chrome Zero-Day Vulnerability
30
Nov
2023

Most Popular Websites Still Allow Users To Have Weak Passwords

The latest analysis shows that tens of millions of people are creating weak passwords on three of the four most…

Chrome Zero-Day Vulnerability That Exploited In The Wild
29
Nov
2023

Chrome Zero-Day Vulnerability That Exploited In The Wild

Google has fixed the sixth Chrome zero-day bug that was exploited in the wild this year. The flaw, identified as CVE-2023-6345,…

Hackers High-Profile Ransomware
29
Nov
2023

Iranian Mobile Banking Malware Steal Login details & Steal OTP

An Android malware campaign was previously discovered that distributed banking trojans targeting four major Iranian Banks: Bank Mellat, Bank Saderat,…

Hackers High-Profile Ransomware
29
Nov
2023

Six Attacks that Break Secrecy of Bluetooth Sessions

Six novel Bluetooth attack methods have been discovered, which were named BLUFFS (Bluetooth Forward and Future Secrecy) attacks. These attacks…