Category: GBHackers

Control D Launches Control D for Organizations
01
Feb
2024

Any.RUN Sandbox Now Expanded to Analyze Linux Malware

The ANY.RUN sandbox has now been updated with support for Linux, further enhancing its ability to provide an isolated and…

Webinar
01
Feb
2024

Pawn Storm APT Launch Hash Relay Attacks on Govt Departments

In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on…

Webinar
01
Feb
2024

Authorities Seized Grandoreiro Banking Malware Infrastructure

The Grandoreiro, a criminal organization that uses banking malware to commit electronic banking fraud against Spain, Mexico, Brazil, and Argentina,…

Webinar
01
Feb
2024

Hackers Started using Python for Developing New ransomware

Ransomware has been one of the top threats to organizations, contributing several millions of dollars to multiple organizations worldwide. Most…

Webinar
01
Feb
2024

Mercedes-Benz Source Code Leaked via mishandled GitHub token

Mercedes-Benz has been reported to have leaked its source code due to a GitHub token leak from an organization employee….

Webinar
31
Jan
2024

Hackers Hijacking MS-SQL Servers to Install Mimic Ransomware

The Trigona ransomware threat actor has been observed engaging in new activities, such as installing Mimic malware that targets MS-SQL…

Webinar
31
Jan
2024

U.S. Officials Detained a 19-year-old SIM-Swap Hacker

In the murky depths of the digital underworld, a tale unfolds: the rise and fall of “King Bob,” a moniker…

Webinar
31
Jan
2024

45K+ Publicly Exposed Jenkins Instances Vulnerable to RCE Attacks

It was previously reported that Jenkins was discovered with a new critical vulnerability, which was associated with unauthenticated arbitrary file…

Webinar
30
Jan
2024

Aembit Announces New Workload IAM Integration with CrowdStrike

Aembit Becomes the First Workload IAM Platform to Integrate with the Industry-Leading CrowdStrike Falcon Platform to Drive Workload Conditional Access…

Webinar
30
Jan
2024

APT Hackers Using FalseFont Backdoor to Hacked Computer

Peach Sandstorm APT targets defense contractors globally via the FalseFont Backdoor, which can access remote systems and exfiltrate data. In this…

Webinar
30
Jan
2024

Beware of Phobos Ransomware Delivered via Office Document

Researchers discovered an Office document with a VBA script intended to spread the Phobos ransomware known as FAUST. The FAUST…

Webinar
30
Jan
2024

GitLab Flaw Let Attackers Write Files to Arbitrary Locations

GitLab releases security updates addressing several critical vulnerabilities, urging all users to upgrade immediately. This release is crucial for ensuring…