Category: GBHackers

Cactus Ransomware Qlik
04
Dec
2023

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed AeroBlade, which appears to be aimed…

Cactus Ransomware Qlik
02
Dec
2023

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own cloud vulnerabilities in their catalog. CVE-2023-6345…

Hackers Antivirus RedLine Malware
01
Dec
2023

Cactus Ransomware Exploiting Qlik code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense for initial access. Qlik Sense is…

Hackers Using Weaponized Invoice
01
Dec
2023

Hackers Install Antivirus to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in…

Hackers Using Weaponized Invoice
01
Dec
2023

Hotel’s Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and…

Hackers Using Weaponized Invoice
01
Dec
2023

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially…

Zyxel Command Injection Flaws
30
Nov
2023

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. …

Zyxel Command Injection Flaws
30
Nov
2023

US Seized Crypto Currency Mixer used by North Korean Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group…

Zyxel Command Injection Flaws
30
Nov
2023

CISA Warns Exploitation Wastewater System Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded…

Zyxel Command Injection Flaws
30
Nov
2023

North Korean Hackers Attacking macOS Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code. All these documents…

Popular Websites weak passwords
30
Nov
2023

Zyxel Command Injection Flaws Let Attackers Run OS Commands

Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor…

Sixth Chrome Zero-Day Vulnerability
30
Nov
2023

Most Popular Websites Still Allow Users To Have Weak Passwords

The latest analysis shows that tens of millions of people are creating weak passwords on three of the four most…