Category: GBHackers

10 Cybersecurity Misconfigurations
09
Oct
2023

Qakbot Deliver Knight Ransomware & Weaponized LNK Files

Qakbot’s infrastructure and cryptocurrency assets were seized by government authorities in an operation in August 2023 with the assistance of…

Chinese Hackers Attacking Industries using Cobalt Strike beacon
09
Oct
2023

Chinese Hackers Attacking Industries using Cobalt Strike beacon

A cyber espionage campaign has been discovered in which threat actors use a variant of the HyperBro loader along with…

Storm-0324 Abusing Microsoft Teams To Gain Access & Deploy Ransomware
06
Oct
2023

Storm-0324 Abusing Microsoft Teams To Gain Access & Deploy Ransomware

Storm-0324, a financially driven threat actor group, was detected delivering phishing messages using Microsoft Teams. In the past, it has…

10 Cybersecurity Misconfigurations
06
Oct
2023

Top 10 Cybersecurity Misconfigurations for Assessments

In a recent joint effort to bolster national cybersecurity, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security…

LightSpy APT Attacking WeChat Users
05
Oct
2023

Top 7 REST API Security Strategies to Secure Your Endpoints

In today’s REST API-driven landscape, most APIs are REST-based and widely utilized by web applications. These APIs are like versatile…

Hackers Exploit Atlassian Confluence Zero-day Flaw
05
Oct
2023

Hackers Exploit Atlassian Confluence Zero-day Flaw

The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an…

Microsoft Office XSS Flaw
05
Oct
2023

Microsoft Office XSS Flaw Let Attackers Execute Arbitrary Code

A recently discovered vulnerability in Microsoft Office Word has raised concerns over the security of the popular productivity suite.  This…

Wireshark 4.0.10 Released: What’s New!
05
Oct
2023

Wireshark 4.0.10 Released: What’s New!

Wireshark, formerly known as Ethereal, is a widely used, free, and open-source network protocol analyzer that allows users to capture…

Huge Surge in Cyber Attacks Targeting Real Estate
05
Oct
2023

Huge Surge in Cyber Attacks Targeting Real Estate

Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics.  They leverage advanced technologies, use…

Hijacking Microsoft SQL Servers
05
Oct
2023

ShellTorch Flaw Exposes Thousands of AI Servers to RCE Attacks

ShellTorch Serve is an open-source model-serving library developed by PyTorch that simplifies the deployment of machine learning models for inference…

Linux Vulnerability Attacks Root Privileges
05
Oct
2023

Linux Vulnerability Attacks Root Privileges

A buffer overflow issue has been disclosed in the GNU C Library’s dynamic loader ld.so, which might allow local attackers…

Hijacking Microsoft SQL Servers
05
Oct
2023

Hackers are Abusing Dropbox to steal Microsoft SharePoint login

A growing cyber threat involving Dropbox has emerged, and it’s raising concerns across the cybersecurity landscape.  In the initial two…