Category: GBHackers

NukeSped Malware Exploiting Apache ActiveMQ Vulnerability
27
Nov
2023

NukeSped Malware Exploiting Apache ActiveMQ Vulnerability

The Andariel threat group has been discovered installing malware via the exploitation of the Apache ActiveMQ remote code execution vulnerability…

DarkGate Evolved Complete Toolkit
27
Nov
2023

North Korean Hackers Exploit MagicLine4NX Zero-day

North Korea, DPRK threat actors, have been reportedly involved in several supply-chain attacks to gain unauthorized access to the intranet…

DarkGate Evolved Complete Toolkit
27
Nov
2023

Konni Group Use Weaponized Word Documents Deliver RAT Malware

In the ever-evolving cybersecurity domain, the resurgence of NetSupport RAT, a Remote Access Trojan (RAT), has raised concerns among security…

DarkGate Evolved Complete Toolkit
27
Nov
2023

MOVEit Hack :AutoZone Users Personal Data Hacked

AutoZone Inc., a US retailer of automotive parts and accessories, warned customers that their data had been compromised as a…

DarkGate Evolved Complete Toolkit
27
Nov
2023

Dell Command Flaw Let Attackers Compromise Vulnerable System

It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by…

DarkGate Evolved Complete Toolkit
27
Nov
2023

North Korean Hackers Exploiting Zero-day Vulnerabilities

The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several…

ZTNA and VPN
27
Nov
2023

DarkGate Malware-as-a-Service Evolved as Complete Toolkit

DarkGate is a complete toolkit, first discovered in 2018, that provides attackers with extensive capabilities to access target systems completely. On…

ZTNA and VPN
25
Nov
2023

The RAT King “NetSupport RAT” Back in Action Via Fake Browser

In the perpetually evolving realm of cybersecurity, the reawakening of NetSupport RAT, a Remote Access Trojan (RAT), casts a looming…

ZTNA and VPN
24
Nov
2023

Authorities Seized $9M in Crypt0 Dollar Conversion

Authorities seized about $9 million in crypto, which was earned by taking advantage of over 70 victims nationwide through alleged…

MySQL Security
24
Nov
2023

ZTNA and VPN – What is the Difference?

In the late 1990s, VPN technology revolutionized remote work. However, the traditional VPN model has become outdated and unworkable as…

Cisco Patch HTTP/2 Rapid Reset Attack
23
Nov
2023

MySQL Security Best Practices Guide

MySQL stands out for its reliability and efficiency among the various database systems available. However, as with any technology that…

Cisco Patch HTTP/2 Rapid Reset Attack
23
Nov
2023

Kubernetes Secrets Allow Hackers Access Sensitive Environments

Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications.  Besides this, hackers…