Category: GBHackers

Hackers Use Weaponized PDFs and Chat Apps
15
Aug
2023

Hackers Use Weaponized PDFs and Chat Apps

A malware campaign targeting the Ministries of Foreign Affairs of NATO-aligned countries was recently discovered, which used PDF files masquerading…

Ford Cars WiFi Vulnerability Let Attackers Execute Remote Code
14
Aug
2023

Ford Cars WiFi Vulnerability Let Attackers Execute Remote Code

Ford recently identified a buffer overflow flaw in the Wi-Fi driver used by it in the SYNC 3 infotainment system….

Hackers Compromised ChatGPT Model
14
Aug
2023

Xiaomi Mi Phones Flags Telegram as Malicious App

Xiaomi, the Asian smartphone giant, has implemented measures within its MIUI operating system that flag Telegram as a malicious app. …

Beware of Fake Chrome Browser Updates that Install Malware
14
Aug
2023

Beware of Fake Chrome Browser Updates that Install Malware

Reports indicate that there seems to be an ongoing campaign that lures victims into installing a Remote Administration Tool called…

Black Hat USA 2023: Complete AI Briefings Roundup
12
Aug
2023

Black Hat USA 2023: Complete AI Briefings Roundup

The 26th annual BLACK HAT USA is taken place at the Mandalay Bay Convention Centre in Las Vegas from August…

Hackers Compromised ChatGPT Model
12
Aug
2023

Hackers Compromised ChatGPT Model with Indirect Prompt Injection

ChatGPT quickly gathered more than 100 million users just after its release, and the ongoing trend includes newer models like…

Authorities Taken Down Bulletproof Hosting
11
Aug
2023

MoustachedBouncer Attacking Foreign Embassies Using NightClub

MoustachedBouncer, a cyberespionage group active since 2014, likely has performed ISP-level adversary-in-the-middle (AitM) attacks since 2020 to compromise its targets….

Dramatic Surge in Social Engineering and Web Attacks
11
Aug
2023

Dramatic Surge in Social Engineering and Web Attacks

The Second quarter of 2023 has shown a significant increase in the overall cyber-threat risks. The blocking of unique web…

Authorities Taken Down Bulletproof Hosting
11
Aug
2023

Researchers Uncover Series of Ransomware Attacks

Ransomware groups often recycle tools, techniques, and procedures. Even some of them also provide playbooks for affiliates as well. Numerous…

Authorities Taken Down Bulletproof Hosting
10
Aug
2023

Authorities Taken Down Bulletproof Hosting Provider Lolek

The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and…

New Infostealer Malware Steal Logs & Corporate Access Data
10
Aug
2023

New Infostealer Malware Steal Logs & Corporate Access Data

Infostealer malware is becoming extremely popular among cybercriminals, especially in the malware-as-a-service (MaaS) based sector. These kinds of malware remain…

Researchers Tricked Hackers into Reveal Their Secrets Using Honeypot
10
Aug
2023

Researchers Tricked Hackers into Reveal Their Secrets Using Honeypot

In the last three years, hackers unknowingly seeking data or malware deployment have found a seemingly vulnerable virtual machine that…