Category: GBHackers

Malware Sandboxes
23
Aug
2023

How Does it Strengthen Your Cyber Security

Cyberattacks are becoming increasingly sophisticated, threatening organizations’ critical infrastructure and sensitive data more than ever. Core solutions such as SIEMs…

Carderbee Hacking Group - Supply Chain Attack
23
Aug
2023

Carderbee Hacking Group – Supply Chain Attack

For a supply chain attack and to plant the Korplug backdoor (aka PlugX) on the systems of the targeted victims,…

Apache XML Graphics Batik Flaw Exposes Sensitive Information
23
Aug
2023

Apache XML Graphics Batik Flaw Exposes Sensitive Information

Two Server-Side Request Forgery (SSRF) vulnerabilities were found in Apache Batik, which could allow a threat actor to access sensitive…

Let Attackers Access Critical APIs
22
Aug
2023

Let Attackers Access Critical APIs

An unauthenticated critical API access vulnerability was found in the Ivanti Sentry interface, which could allow a threat actor to…

Researchers Uncovered the Developer of CypherRAT & CraxsRAT
22
Aug
2023

Researchers Uncovered the Developer of CypherRAT & CraxsRAT

Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT….

Apache Ivy Injection Flaw
22
Aug
2023

Apache Ivy Injection Flaw Let Attackers Exfiltrate Sensitive Data

A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data…

Juniper Networks Junos OS let Attacker Remotely Execute Code
22
Aug
2023

Juniper Networks Junos OS let Attacker Remotely Execute Code

Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability…

DotRunpeX Injector Widely Delivers Known Malware Families to Attack Windows
22
Aug
2023

DotRunpeX Injector Widely Delivers Known Malware Families to Attack Windows

DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware…

Cyber Criminals hide malicious traffic
21
Aug
2023

3,000+ Android Malware Using Unique Compression Methods

Android Smartphones lay a vital role in our daily life, as they help us to stay connected and, not only…

Interpol Arrested 14 cybercriminals and 20,674 cyber networks
21
Aug
2023

Interpol Arrested 14 cybercriminals and 20,674 cyber networks

The recent Africa Cyber Surge II operation conducted by INTERPOL and AFRIPOL has revealed a stark reality – the surge…

Artificial Airplane Mode
19
Aug
2023

hackers Exploit Google Drive, OneDrive to Hide Malicious Traffic

Threat actors are actively modifying their TTPs to counter the advanced security mechanisms and tools to accomplish their illicit goals…

Cuba Ransomware Armed with New Weapons to Attack U.S Infrastructure
18
Aug
2023

Cuba Ransomware Armed with New Weapons to Attack U.S Infrastructure

The Cuba ransomware seems to be gaining more pace with each passing year, and this ransomware has been operating and…