Category: GBHackers

R2R Stomping - New Method to Run the Hidden Code in Binaries
10
Oct
2023

R2R Stomping – New Method to Run the Hidden Code in Binaries

Your perceived reality can differ from the .NET code you observe in debuggers like dnSpy, raising questions about its behavior…

Cobalt Strike 4.9 Released: What’s New!
10
Oct
2023

Cobalt Strike 4.9 Released: What’s New!

The latest version of Cobalt Strike 4.9 is now available. This release includes improvements to Cobalt Strike’s post-exploitation capabilities, including…

Mirai-based DDoS Attackers Adopted New Router Exploits
10
Oct
2023

Mirai-based DDoS Attackers Adopted New Router Exploits

In September 2023, FortiGuard Labs’ vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign.  This campaign, known…

MacOS DirtyNIB Vulnerability Let Attackers Execute Malicious Code
10
Oct
2023

MacOS DirtyNIB Vulnerability Let Attackers Execute Malicious Code

A new zero-day vulnerability has been discovered in Apple’s macOS systems, which allows threat actors to execute code on behalf…

Video Surveillance Camera Vulnerability to Disable Alarms
09
Oct
2023

Video Surveillance Camera Vulnerability to Disable Alarms

Pablo Martínez, a member of the Red Team at cybersecurity firm Entelgy Innotec Security, has uncovered significant vulnerabilities in low-cost…

Maintainers of a open tool Warns of Critical Curl Vulnerability
09
Oct
2023

Maintainers of a open tool Warns of Critical Curl Vulnerability

Two new vulnerabilities have been discovered in the widely used Curl tool. These two vulnerabilities are identified as CVE-2023-38545 and…

Lazarus APT Group Laundered $900 Million of Cryptocurrency
09
Oct
2023

Lazarus APT Group Laundered $900 Million of Cryptocurrency

Threat actors have been laundering currencies with multiple methods. One of the most predominant ways they have been using lately…

Chinese Android-based Devices come pre-installed With Firmware
09
Oct
2023

Chinese Android-based Devices come pre-installed With Firmware

The Trojan War’s famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes…

10 Cybersecurity Misconfigurations
09
Oct
2023

Qakbot Deliver Knight Ransomware & Weaponized LNK Files

Qakbot’s infrastructure and cryptocurrency assets were seized by government authorities in an operation in August 2023 with the assistance of…

Chinese Hackers Attacking Industries using Cobalt Strike beacon
09
Oct
2023

Chinese Hackers Attacking Industries using Cobalt Strike beacon

A cyber espionage campaign has been discovered in which threat actors use a variant of the HyperBro loader along with…

Storm-0324 Abusing Microsoft Teams To Gain Access & Deploy Ransomware
06
Oct
2023

Storm-0324 Abusing Microsoft Teams To Gain Access & Deploy Ransomware

Storm-0324, a financially driven threat actor group, was detected delivering phishing messages using Microsoft Teams. In the past, it has…

10 Cybersecurity Misconfigurations
06
Oct
2023

Top 10 Cybersecurity Misconfigurations for Assessments

In a recent joint effort to bolster national cybersecurity, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security…