Category: GBHackers

Why Storage & Backup Are Cybersecurity’s Weakest Links?
02
Nov
2023

Why Storage & Backup Are Cybersecurity’s Weakest Links?

A lot of money is being spent to protect the enterprise against intrusion. Ransomware protection is currently in the spotlight…

Cisco AnyConnect SSL VPN Flaw Let Attacker Launch DoS Attack
02
Nov
2023

Cisco AnyConnect SSL VPN Flaw Let Attacker Launch DoS Attack

A vulnerability of medium severity, identified as CVE-2023-20042, with a CVSS score of 6.8, was found in the AnyConnect SSL…

Hackers Abuse Google Search Ads
02
Nov
2023

Top 3 Cyber Threats That Attack Banks in 2023: Sandboxing Guide

Bank robbers of today are nothing like their counterparts of the past. Modern-day Bonnie and Clyde operate remotely, carrying out…

Hackers Attacking Blockchain Engineers with Novel macOS Malware
02
Nov
2023

Hackers Attacking Blockchain Engineers with Novel macOS Malware

The frequency of hackers exploiting macOS flaws varies over time, but Apple continuously releases security updates to patch vulnerabilities.  While…

Prolific Puma Service, Domain Generator and URL Shortener
02
Nov
2023

Prolific Puma Service, Domain Generator and URL Shortener

Hackers can exploit Massive Domain Generator and URL Shortener services by creating large numbers of deceptive or malicious domains and…

Hackers Deliver Malicious DLL Files With Legitimate EXE Files
01
Nov
2023

Hackers Deliver Malicious DLL Files With Legitimate EXE Files

Hackers opt for DLL hijacking as a technique to exploit vulnerable applications because it allows them to load malicious code…

Hackers Abuse Google Search Ads
01
Nov
2023

Hackers Weaponize HWP Documents to Attack Defense sectors

HWP documents are primarily associated with the Hangul Word Processor software used in South Korea.  Hackers may opt for HWP…

Hackers Abuse Google Search Ads
01
Nov
2023

F5 Warns of Attacks Targeting BIG-IP SQL injection vulnerability

F5 Networks has issued a security alert about a severe vulnerability in its BIG-IP Configuration utility, identified as CVE-2023-46748.  This…

Hackers Abuse Google Search Ads
01
Nov
2023

CitrixBleed vulnerability exploited by a ransomware gang

At the end of October, AssetNote released a proof-of-concept for the CVE-2023–4966 associated with sensitive information disclosure for Citrix Netscaler…

Hackers Abuse Google Search Ads
01
Nov
2023

Hackers Abuse NuGet Packages to Deliver SeroXen RAT

The NuGet package manager, which .NET developers widely use, has been under attack by a series of malicious activities, according…

Hackers Abuse Google Search Ads
01
Nov
2023

Atlassian Asks Customers to Fix Critical Security Flaw Right Away!

Atlassian has been reported with a critical vulnerability in their Confluence Software, which several organizations have widely adopted. The CVE…

Hackers Abuse Google Search Ads to Deploy Bonanza Malware
31
Oct
2023

Hackers Abuse Google Search Ads to Deploy Bonanza Malware

Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking advantage…