Category: GBHackers

Hackers Abuse Discord
18
Oct
2023

Hackers Deliver Weaponized Notepad++ Via Google Ads

Cybercriminals are known to exploit malicious advertising techniques for targeting the widely-used Notepad++ text editor for Windows. This could lead…

Hackers Abuse Discord
18
Oct
2023

Russian Hackers Bypass EDR to Deliver Weaponized TeamViewer

TeamViewer’s popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain….

Hackers Abuse Discord
17
Oct
2023

XorDDoS Infects Linux Devices & uses them to Carry out DDoS

A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies…

Hackers Abuse Discord
17
Oct
2023

Researchers Uncovered the Hack of a Power Station in Israel

In the continuing Israel-Palestine conflict, there has been a noticeable rise in hacktivist groups who are planning an unending attack…

AvosLocker Ransomware
17
Oct
2023

Hackers Abuse Discord to Blend Within Organizations’ Network

Discord has become a household name in online gaming and digital communication.  Gamers, friends, and families flock to this platform…

AvosLocker Ransomware
16
Oct
2023

AgentTesla Stealer Delivered Via Weaponized PDF and CHM Files

AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the…

AvosLocker Ransomware
16
Oct
2023

Microsoft to Kill NTLM and Expand Kerberos Authentication

In an ever-changing digital landscape, robust security measures are paramount. As Windows adapts to meet the evolving demands of our world,…

Container Security
16
Oct
2023

Hackers Using Remote Admin Tools AvosLocker Ransomware

Cybercriminals behind the AvosLocker ransomware attack employed a tactic of infecting organizations through Open-Source Remote Administration Tools. This method allowed…

Container Security
13
Oct
2023

Container Security in a GitOps Environment

GitOps is a methodology that uses Git (or other version control systems) to store all aspects of a project’s infrastructure,…

Pro-Russia Hackers Exploiting Winrar Flaw to Steal Credentials
13
Oct
2023

Pro-Russia Hackers Exploiting Winrar Flaw to Steal Credentials

A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831…

Phishing-as-a-Service from Strox hackers phish any brand
13
Oct
2023

Phishing-as-a-Service from Strox hackers phish any brand

The ever-evolving world of cybercrime has given birth to a disturbing phenomenon – Phishing-as-a-Service (PhaaS), and one name that sends…

CISA Known Exploited Vulnerabilities
13
Oct
2023

ToddyCat APT Hackers Exploiting Vulnerable Exchange Servers

ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently…