Category: GBHackers

Hackers Hijacking Facebook Accounts with Malware
03
Nov
2023

Hackers Hijacking Facebook Accounts with Malware

Social media platforms offer financially motivated threat actors opportunities for large-scale attacks by providing a vast user base to target…

New CVSS v4.0 Released - What's New!
03
Nov
2023

New CVSS v4.0 Released – What’s New!

CVSS (Common Vulnerability Scoring System) is vital for supplier-consumer interaction, offering a numerical score to assess security vulnerabilities’ technical severity…

Accenture Acquires Leading Cybersecurity Firm Innotec Security
03
Nov
2023

Accenture Acquires Leading Cybersecurity Firm Innotec Security

Accenture, the global technology services and consulting giant, has announced the acquisition of Innotec Security, a leading cybersecurity-as-a-service provider based…

DarkGate, Which Abused Microsoft Teams, Leverages MSI Files
03
Nov
2023

DarkGate, Which Abused Microsoft Teams, Leverages MSI Files

A new wave of cyberattacks has been discovered by Netskope Threat Labs, involving the use of SharePoint as a delivery…

Multiple Cisco Services Engine Flaws- Upload Arbitrary Files
03
Nov
2023

Multiple Cisco Services Engine Flaws- Upload Arbitrary Files

Multiple vulnerabilities have been discovered in the Cisco Services Engine associated with Arbitrary File Upload and Denial of Service assigned…

Why Storage & Backup Are Cybersecurity’s Weakest Links?
02
Nov
2023

Why Storage & Backup Are Cybersecurity’s Weakest Links?

A lot of money is being spent to protect the enterprise against intrusion. Ransomware protection is currently in the spotlight…

Cisco AnyConnect SSL VPN Flaw Let Attacker Launch DoS Attack
02
Nov
2023

Cisco AnyConnect SSL VPN Flaw Let Attacker Launch DoS Attack

A vulnerability of medium severity, identified as CVE-2023-20042, with a CVSS score of 6.8, was found in the AnyConnect SSL…

Hackers Abuse Google Search Ads
02
Nov
2023

Top 3 Cyber Threats That Attack Banks in 2023: Sandboxing Guide

Bank robbers of today are nothing like their counterparts of the past. Modern-day Bonnie and Clyde operate remotely, carrying out…

Hackers Attacking Blockchain Engineers with Novel macOS Malware
02
Nov
2023

Hackers Attacking Blockchain Engineers with Novel macOS Malware

The frequency of hackers exploiting macOS flaws varies over time, but Apple continuously releases security updates to patch vulnerabilities.  While…

Prolific Puma Service, Domain Generator and URL Shortener
02
Nov
2023

Prolific Puma Service, Domain Generator and URL Shortener

Hackers can exploit Massive Domain Generator and URL Shortener services by creating large numbers of deceptive or malicious domains and…

Hackers Deliver Malicious DLL Files With Legitimate EXE Files
01
Nov
2023

Hackers Deliver Malicious DLL Files With Legitimate EXE Files

Hackers opt for DLL hijacking as a technique to exploit vulnerable applications because it allows them to load malicious code…

Hackers Abuse Google Search Ads
01
Nov
2023

Hackers Weaponize HWP Documents to Attack Defense sectors

HWP documents are primarily associated with the Hangul Word Processor software used in South Korea.  Hackers may opt for HWP…