Category: GBHackers

Webinar
07
Feb
2024

DiceLoader Malware Used to Attack Corporate Business

An intrusion set called FIN7 has been known to be operating since 2015 and is composed of Russian-speaking members. This…

How to Extract Malware Configurations in a Sandbox
06
Feb
2024

How to Extract Malware Configurations in a Sandbox

Indicators of Compromise (IOCs) are the fuel that powers our cybersecurity defenses and keeps them effective. The most sought-after source…

Webinar
06
Feb
2024

Cloudflare Server Compromised Due to Leaked Access Token

On November 23, 2023, Cloudflare detected a threat actor on the self-hosted Atlassian server. The attack was initiated using a…

Webinar
06
Feb
2024

Researchers Unvield the Sophisticated Ransomware by Black Hunt

The Black Hunt ransomware has recently become a significant threat to the cybersecurity landscape. This malicious software has already wreaked…

Webinar
06
Feb
2024

Multiple Container Flaws allow attackers to access host OS

Four new vulnerabilities have been identified in containers that could allow a threat actor to escape the container and gain…

The Impact of Emerging Technologies on Cybersecurity Jobs
06
Feb
2024

What is SaaS Sprawl and how to Combat its Security Risks?

When we talk about the cloud, it’s not just a matter of data drifting weightlessly in some digital ether. The…

Webinar
05
Feb
2024

Mispadu Malware Exploits Windows SmartScreen to Attack Users

A new variant of Mispadu stealer has been identified by researchers, which specifically targets victims in Mexico. This variant of…

Webinar
05
Feb
2024

Hackers Using 130,000+ Domains for Cyber Attacks

A new large-scale campaign named “ApateWeb ” has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted…

Webinar
02
Feb
2024

FritzFrog Botnet Attacking Linux Servers to Steal SSH Credentials

The FritzFrog botnet, originally identified in 2020, is an advanced peer-to-peer botnet built in Golang that can operate on both…

Webinar
02
Feb
2024

New Android Malware on Google Play Disguised as News Apps

Twelve malicious Android espionage applications have been discovered by researchers, with all of them executing a remote access trojan (RAT)…

Webinar
02
Feb
2024

State-of-the-Art Redis Malware Bypasses Security Solutions

Discovering a clandestine and potent menace, Aqua Nautilus researchers have brought to light the HeadCrab, an advanced threat actor wielding…

Webinar
02
Feb
2024

Ivanti Discloses 2 New zero-days, 1 Under Active Exploitation

Two new zero-day vulnerabilities have been discovered in Ivanti Connect Secure and Ivanti Policy Secure products that are assigned with…