Category: GBHackers

Webinar
22
Jan
2024

DarkGate Malware Abuses AutoIT Scripting Payload Obfustication

DarkGate is a type of malware that employs Auto-It compiled loaders that cause a considerable threat because of its advanced evasion strategies and persistence…

Webinar
21
Jan
2024

New Outlook Flaw Let Attackers Access Hashed Passwords

A new Outlook vulnerability that can be used to extract NTLMv2 hashes by exploiting Outlook, Windows Performance Analyzer (WPA), and…

Webinar
20
Jan
2024

9 UEFI Flaws Expose Computers to Remote Attacks

Hackers exploit UEFI flaws to gain unauthorized access to a system’s firmware, enabling them to implant persistent malware or manipulate…

Webinar
19
Jan
2024

CISA & FBI released Incident Response Guide for WWS Sector

Malicious cyber incidents, such as ransomware and unauthorized access, have affected the Water and Wastewater Sector (WWS) in the past…

Webinar
19
Jan
2024

New Sophisticated NFT Airdrop Attack Steals Funds

The allure of NFTs, those shimmering digital tokens holding unique artworks and promises of fortune, has captivated the world.  But…

Webinar
19
Jan
2024

FBI & CISA Warns of Critical Infrastructure Risk by Chinese Drones

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have raised a red flag: Chinese-made…

Webinar
19
Jan
2024

170,000+ Android TVs Hacked by Bigpanzi Bot to Launch DDoS

Android TVs are widely used, and due to their wide adoption, threat actors frequently target them for unauthorized access or…

Webinar
19
Jan
2024

A Tool For Open-source Investigations

OSINVGPT is an AI-based system that helps security analysts with open-source investigations and tool selection. While this tool was developed…

Webinar
18
Jan
2024

Multichain Inferno Drainer Abuse Web3 Protocols

A cryptocurrency-related phishing scam that uses malware called a drainer is one of the most widely used tactics these days. From…

Android Malware Masquerades as Chrome Browser
18
Jan
2024

How Do You Protect Your APIs From DDoS Attacks?

Today, DDoS attacks stand out as the most widespread cyber threat, extending their impact to APIs.  When successfully executed, these…

Webinar
18
Jan
2024

Citrix NetScaler Zero-day Exploited in the Wild: CISA Urges Patch

Cisco NetScaler ADC and NetScaler Gateway have been discovered to have two vulnerabilities, which were associated with remote code execution…

Webinar
18
Jan
2024

Androxgh0st Botnet Malware Steals AWS, Microsoft Credentials

Threat actors use botnet malware to gain access to the network of compromised systems that enable them to perform several…