Category: GBHackers

650,000+ Malicious Domains Registered Resembling ChatGPT
02
Jan
2024

650,000+ Malicious Domains Registered Resembling ChatGPT

Hackers abuse the ChatGPT name for malicious domains to exploit the credibility associated with the ChatGPT model, deceiving users into…

New Medusa Stealer Attacking Users to Steal Login Credentials
29
Dec
2023

New Medusa Stealer Attacking Users to Steal Login Credentials

While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2,…

Malicious Google and X Ads
28
Dec
2023

Operation Triangulation – 0-click iMessage Attacks to Hack iPhones

Hackers exploit Zero-Days because these vulnerabilities are unknown to software developers, making them valuable for launching attacks before developing patches. …

Malicious Google and X Ads
28
Dec
2023

Chinese Hackers Exploit New Zero-Day in Barracuda’s ESG

Barracuda Email Security Gateway (ESG) Appliance has been discovered with an Arbitrary code Execution vulnerability exploited by a China Nexus…

Malicious Google and X Ads
28
Dec
2023

Apache OfBiz Zero-Day Let Attackers Bypass Authentication

A new vulnerability has been discovered in Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. Apache OfBiz is used…

Malicious Google and X Ads
28
Dec
2023

10 Prominent Cybersecurity Acquisitions of 2023

The cybersecurity domain is undergoing rapid changes owing to the rise in frequency and complexity of cyber threats. As the…

Nim-Based Malware Word Document
27
Dec
2023

Hackers Stolen Over $58 Million Crypto Via Malicious Google Ads

Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been…

Malicious Google and X Ads
27
Dec
2023

Possible Data Exfiltration by Hackers

Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating…

Android Malware Actively Infecting Devices
27
Dec
2023

Nim-Based Malware Delivered via Weaponized Word Document

Hackers use weaponized Word documents to deliver malicious payloads through social engineering.  By embedding malware or exploiting vulnerabilities in these…

Protect Your APIs from Bot Attacks
26
Dec
2023

Android Malware Actively Infecting Devices to Take Full Control

Android malware infects devices to take full control for various illicit purposes like:-  Stealing sensitive information Generating unauthorized financial transactions…

Protect Your APIs from Bot Attacks
26
Dec
2023

Cisco to Acquire Multi-Cloud Network & Security Startup Isovalent

In a strategic move destined to fortify its dominance in the ever-evolving realm of cloud security, Cisco has officially declared…

How Do You Protect Your APIs from Bot Attacks?
26
Dec
2023

How Do You Protect Your APIs from Bot Attacks?

Organizations face an escalating threat of bot attacks in the rapidly evolving digital landscape. As revealed in our latest AppSec…