Category: GBHackers

BlackCat Ransomware
20
Sep
2023

BlackCat Ransomware Leveraging Remote Monitoring Tools

BlackCat Ransomware variant Sphynx has been newly identified with additional features used for encrypting Azure Storage accounts. This Sphynx variant…

AMBERSQUID Cryptojacking
20
Sep
2023

Hackers Are Using AI For Cyberattacks. How Can We Stop Them?

The use of AI has greatly increased over the past few months, with programs like ChatGPT and Bing AI making…

Cryptojacking Attack Leverages AWS Services
20
Sep
2023

Cryptojacking Attack Leverages AWS Services

Cryptojacking is a malicious cyberattack in which an attacker stealthily utilizes a victim’s computer or device to mine cryptocurrencies such…

Pro-Russian Actors Initiated DDoS Against Canadian Organizations
19
Sep
2023

Pro-Russian Actors Initiated DDoS Against Canadian Organizations

The Canadian government, banking, and transportation industries have recently been the targets of many distributed denial of service (DDoS) attacks….

Hackers Attack Thousands of Organizations Using Password Spraying
19
Sep
2023

Hackers Attack Thousands of Organizations Using Password Spraying

Peach Sandstorm, an Iranian Hackers group that targets organizations globally, aligns with the following threat groups:- Besides this, in the…

8 XSS Vulnerabilities Allow Attackers to Deliver Malicious Payloads
15
Sep
2023

8 XSS Vulnerabilities Allow Attackers to Deliver Malicious Payloads

Azure HDInsight has been identified with multiple Cross-Site Scripting – XSS vulnerabilities related to Stored XSS and Reflected XSS. The…

Windows11 Themes vulnerability-Attackers Execute Arbitrary Code
15
Sep
2023

Windows11 Themes vulnerability-Attackers Execute Arbitrary Code

An Arbitrary code execution vulnerability has been found in Windows 11. This vulnerability is a result of several factors, such…

Memory Corruption Flaw in ncurses API Library
15
Sep
2023

Memory Corruption Flaw in ncurses API Library

Multiple memory corruption vulnerabilities have been discovered in the ncurses library, which various programs use on multiple operating systems like…

Next-Gen Email Firewall
15
Sep
2023

3AM Ransomware Attack – Stop Services, Delete Shadow Copies

Ransomware is a universal threat to enterprises, targeting anyone handling sensitive data when profit potential is high. A new ransomware…

Trellix DLP Vulnerability Allows Attackers To Delete Files
15
Sep
2023

Trellix DLP Vulnerability Allows Attackers To Delete Files

A privilege escalation vulnerability has been identified in the Trellix Windows DLP endpoint for Windows, which may be exploited to…

Storm-0324
14
Sep
2023

Storm-0324 Using Microsoft Teams to Hack Corporate Networks

According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations….

Next-Gen Email Firewall
14
Sep
2023

How to to Secure Your Inboxes 2023

Email communication is still widely used as an attack vector despite the ever-changing nature of cyber threats. The vast number…