Category: GBHackers

Cross Site Scripting
23
Jun
2023

What is XSS (Cross Site Scripting)?

XSS is a very commonly exploited vulnerability type that is very widely spread and easily detectable, and also it is…

Hackers Using New Mystic Stealer Malware in Cyber Attacks
20
Jun
2023

Hackers Using New Mystic Stealer Malware in Cyber Attacks

Recently, the cybersecurity researchers at CYFIRMA found that hackers are actively using “Mystic Stealer Malware,” a new information stealer.  It’s…

Hijack S3 Buckets
19
Jun
2023

Layer 7 DDoS Attacks on Microsoft

Recently, it’s been confirmed by Microsoft that the current outage problems experienced by the following services of Microsoft were due…

GravityRAT Spyware WhatsApp
19
Jun
2023

GravityRAT Spyware WhatsApp

Since August 2022, a recently discovered Android virus named “GravityRAT” has rapidly circulated through a new Android malware campaign.  It…

Hijack S3 Buckets
19
Jun
2023

The brandjacking threat: How companies can avoid losing brand equity – GBHackers – Latest Cyber Security News

Cybersecurity is a constant concern for modern companies. While enterprises can use several world-class tools to protect their internal networks,…

SOC Analyst Training
17
Jun
2023

SOC Defense phase – Understanding the Cyber Attack Chain

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks….

Hackers Can Uncover Cryptographic Keys Using Power LEDs
16
Jun
2023

Hackers Can Uncover Cryptographic Keys Using Power LEDs

A shocking discovery has been made by researchers, unveiling an innovative method for extracting covert encryption keys from smart cards…

Massive Phishing Campaign
16
Jun
2023

Massive Phishing Campaign Uses 6,000 Sites

Bolster’s threat research team recently discovered an extensive brand impersonation effort targeting over 100 well-known clothes, footwear, and apparel firms….

VMware ESXi Zero-Day
16
Jun
2023

Chinese Hackers Exploit VMware ESXi Zero-Day

The Chinese cyberespionage gang, identified as UNC3886, has been spotted employing a VMware ESXi zero-day vulnerability to get escalated privileges…

EMFI Attack Against Drones
16
Jun
2023

New EMFI Attack Against Drones Leads to Complete Take Over

Based on the recent reports by IOActive, Drones, also called Unmanned Aerial Vehicles (UAVs), are vulnerable to code injection, which…

LockBit Ransomware Gang
16
Jun
2023

LockBit Ransomware Gang Earned $91 Million

LockBit was one of the most widely used ransomware in 2022, targeting both small and large organizations irrespective of their…

Hijack S3 Buckets
16
Jun
2023

Hackers Use New Exploit Technique to Hijack S3 Buckets

It has been discovered that threat actors might take over expired Amazon S3 buckets to serve rogue binaries without changing…