Category: GBHackers

Threat Actors Using Management Tools to Deploy Ransomware
26
Sep
2023

Threat Actors Using Management Tools to Deploy Ransomware

The threat actors have been spotted increasingly depending on Remote Management and Monitoring (RMM) tools, which resulted in a relatively botched Hive…

Unlocking Your Data: How to Convert OST to PST Files Successfully - GBHackers - Latest Cyber Security News
26
Sep
2023

Unlocking Your Data: How to Convert OST to PST Files Successfully – GBHackers – Latest Cyber Security News

This article explores the conversion of Microsoft Outlook’s OST file to PST format and highlights the necessity of this conversion…

EvilBamboo Attacking Android & iOS Devices With Malware
26
Sep
2023

EvilBamboo Attacking Android & iOS Devices With Malware

EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat…

BIND DNS system Flaws Let Attacker Launch DoS Attacks
25
Sep
2023

BIND DNS system Flaws Let Attacker Launch DoS Attacks

In a recent disclosure, BIND 9, a widely-used DNS (Domain Name System) server software, has been found vulnerable to two…

Cryptojacking Campaign Thesaurus
25
Sep
2023

OilRig C#/.NET Backdoor to Attack Wide Range of Industries

OilRig (APT34) is an Iranian cyberespionage group active since 2014, targeting Middle Eastern governments and various industries like:- Chemical Energy…

BlackCat Ransomware
22
Sep
2023

Cryptojacking Campaign Infected Online Thesaurus

Students, authors, and anybody else wishing to improve their vocabulary and language abilities frequently utilize Thesaurus, one of the well-known…

GOLD MELODY threat group
22
Sep
2023

Gold Melody Group Attacking Organizations

The financially motivated GOLD MELODY threat group has been active at least since 2017, attacking organizations by taking advantage of…

MOVEit Transfer SQL Injection
21
Sep
2023

MOVEit Transfer SQL Injection Let the Attacker Gain Unauthorized Access

MOVEit transfer service pack has been discovered with three vulnerabilities associated with SQL injections (2) and a Reflected Cross-Site Scripted…

LUCR-3 Attacking Fortune 2000 Companies Using Victims' Own Tools
21
Sep
2023

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

A new financially motivated threat group named “LUCR-3” has been discovered targeting organizations to steal intellectual property for extortion. This…

QakBot Malware
21
Sep
2023

Is QakBot Malware Officially Dead?

Only a few malware families can claim to have persisted for nearly twenty years, and QakBot (also referred to as…

System Admin Pleads Guilty for Selling Pirated Business Phone
21
Sep
2023

System Admin Pleads Guilty for Selling Pirated Business Phone

For taking part in a large international scheme to earn millions of dollars by selling pirated business telephone system software licenses,…

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code
21
Sep
2023

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

If you use Trend Micro Apex One, you should know that the third-party Antivirus uninstaller feature may have a security…