Category: GBHackers

BlackTech APT Cisco
28
Sep
2023

Case Study: Blocking Botnet-Driven Low-Rate HTTP DDoS Attacks

Indusface research on 1400+ websites recorded a significant surge in DDoS attacks and bot attacks during Q2, 2023, compared to…

BlackTech APT Cisco
28
Sep
2023

Snatch Ransomware Group Leaked Location & Internal Data

The Snatch Ransomware group is considered dangerous due to its advanced techniques and ability to evade detection.  Security systems find…

Cisco WAN Manager Vulnerabilities Attacker Conduct DoS Attack
28
Sep
2023

Cisco WAN Manager Vulnerabilities Attacker Conduct DoS Attack

Cisco, a prominent player in the world of networking and cybersecurity, has issued a critical security advisory concerning multiple vulnerabilities…

BlackTech APT Cisco
28
Sep
2023

Actively Exploited Chrome Zero-day Patched: Update Now!

Google has recently deployed updates to mitigate a newly discovered zero-day vulnerability in their Chrome browser, which is currently being…

Automotive Hacking
28
Sep
2023

BlackTech APT Attacking Network Routers to Breach Networks

Since 2010, a group of hackers known as BlackTech APT has been engaging in malicious activities. The targets of their…

APT Attack Healthcare Industries
27
Sep
2023

Node.js Malware Takes Over Victim’s Computer

Through strategies like polymorphic code, which continuously alters its appearance to prevent detection, as well as employing encryption and obfuscation…

Apple Security Fixes for iPhone, iPad, Safari & Sonoma14
27
Sep
2023

Apple Security Fixes for iPhone, iPad, Safari & Sonoma14

Apple previously reported three zero-day vulnerabilities exploited in the wild by threat actors, which Apple fixed as part of an…

APT Attack Healthcare Industries
27
Sep
2023

North Korean and Chinese Hackers Attacking Healthcare Industries

Healthcare has been one of the primary industries targeted by threat actors as part of every malware or ransomware campaign….

APT Attack Healthcare Industries
27
Sep
2023

How to Secure Your Vehicles Against Hacking

Though we can’t see it, the world brims with more technology than ever. These days, devices with internet connectivity live…

AtlasCross Using Weaponized Word Documents to Deploy Malware
27
Sep
2023

AtlasCross Using Weaponized Word Documents to Deploy Malware

Cybersecurity analysts at NSFOCUS Security Labs recently uncovered an unknown phishing-based attack process during threat-hunting.  Apart from this, during their…

Google Chrome use-after-free Vulnerability Leads to Remote Attack
26
Sep
2023

Google Chrome use-after-free Vulnerability Leads to Remote Attack

Google Chrome has been recently discovered to be a Use-after-free vulnerability that threat actors can exploit to attack users. This…

Newborn Registry MOVEit
26
Sep
2023

Millions Of Records Were Compromised In A MOVEit Data Breach

The Progress MOVEit software’s vulnerability resulted in a cybersecurity breach that affected BORN (the Better Outcomes Registry & Network), which gathers…