Category: GBHackers

Seven Pillars Zero Trust
07
Mar
2024

Hackers Use Number of Legitimate Tools in Ransomware Attacks

Ransomware attacks remain a formidable challenge for organizations worldwide. These attacks not only encrypt critical data, rendering it inaccessible to…

Hackers Exploiting iOS 0-day to Attack iPhones
07
Mar
2024

Hackers Exploiting iOS 0-Day To Attack iPhones

Apple releases emergency fixes to address two new zero-day vulnerabilities in iOS that impact iPhones. The two zero-day vulnerabilities were…

NSA Details Seven Pillars Of Zero Trust
07
Mar
2024

NSA Details Seven Pillars Of Zero Trust

The National Security Agency (NSA) issued a Cybersecurity Information Sheet (CSI) that discusses limiting adversary lateral movement within an organization’s network…

Hackers Abuse QEMU Hardware Emulator for C2 Communication
06
Mar
2024

Hackers Abuse QEMU Hardware Emulator for C2 Communication

QEMU is an open-source platform that provides a secure and private virtualized space for trying out malicious codes, exploits, and…

OpenNMS XSS Flaw Let Attackers Inject JavaScript Payload
06
Mar
2024

OpenNMS XSS Flaw Let Attackers Inject JavaScript Payload

A critical vulnerability in OpenNMS, a widely used network monitoring solution, has been identified, allowing attackers to inject malicious JavaScript…

American Express Credit Card Information Exposed
06
Mar
2024

American Express Credit Card Information Exposed

American Express has recently notified its customers of a data breach involving a third-party service provider, marking a security incident…

WordPress Plugin Godzilla
06
Mar
2024

225,000+ ChatGPT credentials Up For Sale on Dark Web Markets

A prominent cybersecurity technology creator, has released its latest report, “Hi-Tech Crime Trends 2023/2024,” highlighting critical global cyber threats. The…

WordPress Plugin Godzilla
06
Mar
2024

Hackers Install macOS Malware Via Weaponised Calendar Invites

Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading…

WordPress Plugin Godzilla
06
Mar
2024

Hackers use Zoom & Google Meet Lures to Attack Android & Windows

A threat actor has been identified as creating fraudulent Skype, Google Meet, and Zoom websites to distribute malware, explicitly targeting…

WordPress Plugin Godzilla
06
Mar
2024

Project DDoSia – Russian Hackers Planning Massive DDoS Attack

Hackers launch large-scale DDoS attacks to disrupt and make online services inaccessible, driven by motives like revenge or protest, flooding…

Hackers Exploit WordPress Plugin Flaw to Deploy Godzilla
06
Mar
2024

Hackers Exploit WordPress Plugin Flaw to Deploy Godzilla

Hackers have been found exploiting a vulnerability in a WordPress Plugin 3DPrint Lite(CVE-2021-4436) to deploy the notorious Godzilla Web Shell….

How to Create a Sandbox Environment For Malware Analysis - A Complete Guide - GBHackers on Security
05
Mar
2024

How to Create a Sandbox Environment For Malware Analysis – A Complete Guide – GBHackers on Security

In cybersecurity, the battle against malware is critical, akin to handling dangerous pathogens. The importance of secure environments for analyzing…