Category: GBHackers

LUCR-3 Attacking Fortune 2000 Companies Using Victims' Own Tools
21
Sep
2023

LUCR-3 Attacking Fortune 2000 Companies Using Victims’ Own Tools

A new financially motivated threat group named “LUCR-3” has been discovered targeting organizations to steal intellectual property for extortion. This…

QakBot Malware
21
Sep
2023

Is QakBot Malware Officially Dead?

Only a few malware families can claim to have persisted for nearly twenty years, and QakBot (also referred to as…

System Admin Pleads Guilty for Selling Pirated Business Phone
21
Sep
2023

System Admin Pleads Guilty for Selling Pirated Business Phone

For taking part in a large international scheme to earn millions of dollars by selling pirated business telephone system software licenses,…

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code
21
Sep
2023

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

If you use Trend Micro Apex One, you should know that the third-party Antivirus uninstaller feature may have a security…

Nagios Monitoring Tool Vulnerabilities
21
Sep
2023

T-Mobile App Glitch Exposes Other User’s Sensitive Data

The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy….

Bumblebee Abuses WebDAV Protocol to Attack Organizations
20
Sep
2023

Bumblebee Abuses WebDAV Protocol to Attack Organizations

In recent cybersecurity news, the notorious Bumblebee loader has made a resurgence in a new campaign, posing a significant threat…

Nagios Monitoring Tool Vulnerabilities
20
Sep
2023

China Accuses the US of Hacking Huawei Servers Since 2009

Huawei is known for its telecommunications equipment and consumer electronics, including smartphones, and the USA banned Huawei primarily due to…

Nagios Monitoring Tool Vulnerabilities
20
Sep
2023

Nagios Monitoring Tool Vulnerabilities Let Attackers SQL Queries

Nagios XI is a prominent and frequently used commercial monitoring system for IT infrastructure and network monitoring.  Vulnerability Research Engineer…

Hackers have deployed a Linux backdoor to attack government entities
20
Sep
2023

Hackers have deployed a Linux backdoor to attack government entities

Recent reports indicate that threat actors have been using a new type of Linux-targeted backdoor that has never been seen…

Fortinet FortiOS Security Flaw Allows Malicious Code to Be Executed
20
Sep
2023

Fortinet FortiOS Security Flaw Allows Malicious Code to Be Executed

Recent reports indicate that Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which…

Hackers Attacking Telecoms Servers With HTTPSnoop Malware
20
Sep
2023

Hackers Attacking Telecoms Servers With HTTPSnoop Malware

In 2022, state-sponsored actors and advanced adversaries consistently targeted telecoms globally, making it a top sector in Talos IR cases….

Juniper Firewalls Vulnerable to Unauthenticated Code Execution
20
Sep
2023

Juniper Firewalls Vulnerable to Unauthenticated Code Execution

At the end of August 2023, Juniper Networks released a security advisory mentioning the CVE-2023-36845 vulnerability affecting SRX and EX…