Category: GBHackers

TA422 Hackers Attack Organizations
08
Dec
2023

Exploitation Methods Used by PlugX Malware Revealed

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid detection by antivirus programs, making it…

Atlassian Patches RCE Flaw
08
Dec
2023

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative targets.  Outlook vulnerabilities offer:- Access to…

Atlassian Patches RCE Flaw
07
Dec
2023

A Threat to mobile Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been discovered. This vulnerability can be exploited…

SLAM Attack Gets Root Password
07
Dec
2023

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in multiple products. The CVEs for these…

SLAM Attack Gets Root Password
07
Dec
2023

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new AI-powered capability enhancing its Smart Alerting…

AsyncRAT WSF Script Files
07
Dec
2023

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat actors unauthorized access to sensitive data….

AsyncRAT WSF Script Files
07
Dec
2023

Akira Ransomware Exploiting Zero-day Flaws For Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as a serious threat to data security….

Hackers Employ AI
07
Dec
2023

Hackers Deliver AsyncRAT Through Weaponized WSF Script Files

The AsyncRAT malware, which was previously distributed through files with the .chm extension, is now being disseminated via WSF script format. The…

Hackers Employ AI
06
Dec
2023

Serpent Stealer Acquire Browser Passwords and Erases Logs

Beneath the surface of the cyber realm, a silent menace emerges—crafted with the precision of the .NET framework, the Serpent…

Hackers Employ AI
06
Dec
2023

New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT group and their ongoing RustBucket campaign.  As…

Kali Linux 2023.4
06
Dec
2023

Hackers Employ AI to Launch Highly sophistication Attacks

It has been observed that threat actors are using AI technology to conduct illicit operations on social media platforms. These…

Hackers Weaponized Documents Aerospace
06
Dec
2023

Kali Linux 2023.4 Released – What’s New!

Kali Linux 2023.4, the latest version of Offensive Security’s renowned operating system, has been released, and it includes the advanced…