Category: GBHackers

North Korean Hackers Attempted To Steal Sensitive Military Data
30
Sep
2024

North Korean Hackers Attempted To Steal Sensitive Military Data

Diehl Defence anti-aircraft missiles from Baden-Württemberg are successfully intercepting Russian attacks on Kyiv, according to Mayor Vitali Klitschko. The German-supplied…

Nigeria Hackers Sentenced for Selling Financial Information on Dark Web
30
Sep
2024

Nigeria Hackers Sentenced for Selling Financial Information on Dark Web

Simon Kaura, a Nigerian national deported from the United Kingdom, was sentenced in a U.S. federal court for his involvement…

Hacktivist Groups Operating Together! Connection Ober TTPs Uncovered
30
Sep
2024

Hacktivist Groups Operating Together! Connection Ober TTPs Uncovered

Cybersecurity experts have uncovered a significant connection between hacktivist groups BlackJack and Twelve through overlapping tactics, techniques, and procedures (TTPs)….

Israeli Army Hacked Beirut Airport to Threaten Civilians
30
Sep
2024

Israeli Army Hacked Beirut Airport to Threaten Civilians

The Israeli army reportedly hacked into the control tower of Beirut’s Rafic Hariri International Airport. The incident involved issuing threats…

G2 Names INE 2024 Enterprise and Small Business Leader
27
Sep
2024

G2 Names INE 2024 Enterprise and Small Business Leader

INE, a global leader in networking and cybersecurity training and certifications, is proud to announce they have earned 14 awards…

Malicious App On Google Play Steals Cryptocurrency From Android Users
27
Sep
2024

Malicious App On Google Play Steals Cryptocurrency From Android Users

Cybercriminals have shifted their focus to mobile devices, targeting users with a malicious crypto drainer app disguised as the legitimate…

Hackers Targeting AI Agents And Conversational Platforms To Hijacking The Customer Sessions
27
Sep
2024

Hackers Targeting AI Agents And Conversational Platforms To Hijacking The Customer Sessions

Conversational AI platforms, powered by chatbots, are witnessing a surge in malicious attacks, which leverage NLP and ML are increasingly…

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution
27
Sep
2024

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of…

Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page
27
Sep
2024

Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page

Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing…

Hackers Abusing third-party email infrastructure to Send Spam Mails
27
Sep
2024

Hackers Abusing third-party email infrastructure to Send Spam Mails

Hackers are increasingly exploiting third-party email infrastructures to send spam emails. This tactic complicates the detection and prevention of spam…

Hacking Kia Cars Remotely with a License Plate
27
Sep
2024

Hacking Kia Cars Remotely with a License Plate

Cybersecurity researchers have uncovered a significant vulnerability in Kia vehicles that allowed hackers to remotely control key functions using nothing…

Hackers Weaponizing PDF files To Deliver New SnipBot Malware
26
Sep
2024

Hackers Weaponizing PDF files To Deliver New SnipBot Malware

The RomCom malware family, particularly its SnipBot variant, has evolved into a sophisticated threat capable of ransomware, extortion, and targeted…