Category: GBHackers

Webinar
09
Jan
2024

Cacti Blind SQL Injection Flaw Enables Remote Code Execution

Cacti, the performance and fault management framework, has been discovered with a blind SQL injection vulnerability, which could reveal Cacti…

Webinar
09
Jan
2024

Multiple QNAP Severity Flaw Let Attackers Execute Remote Code

QNAP has released multiple security advisories for addressing several high, medium, and low-severity vulnerabilities in multiple products, including QTS, QuTS…

Android Malware Actively Infecting Devices
09
Jan
2024

Incorporat mobile threat defense device management ecosystem

In recent years, we have seen a significant shift in the global workforce. With the proliferation of high-speed internet and…

Webinar
09
Jan
2024

Accenture Buys 6point6 to Expand Cyber Portfolio

Accenture, a global professional services company, has made a strategic move in the U.K. market by acquiring 6point6, a leading…

Webinar
09
Jan
2024

Surge in Open Source Malware Stealing Login Credentials & Data

Over the decade, Python has been dominating the programming languages and consistently growing with open-source love.  Numerous popular Python projects…

Cyqur Launches A Game-Changing Data Encryption
08
Jan
2024

Cyqur Launches A Game-Changing Data Encryption

The web extension, patented in the U.S. and U.K., is now available for pre-order in a limited, pre-sale event. Lack…

AsyncRAT Malware US
08
Jan
2024

xDedic Marketplace Admin and Operators Arrested

In a landmark victory for cybersecurity, the xDedic Marketplace, a notorious haven for cybercrime, has been shut down.  This international…

AsyncRAT Malware Attacking the US Infrastructure
08
Jan
2024

AsyncRAT Malware Attacking the US Infrastructure

AsyncRAT is an open-source remote access Trojan (RAT) malware known for its ability to provide unauthorized access and control over…

Ukraine Targeted by UAC-0050 Using Remcos RAT Pipe Method
05
Jan
2024

Ukraine Targeted by UAC-0050 Using Remcos RAT Pipe Method

Remcos RAT (Remote Control and Surveillance) is a type of Remote Access Trojan used for unauthorized access and control of…

3 New Malicious PyPI Packages Deploy CoinMiner Linux
05
Jan
2024

3 New Malicious PyPI Packages Deploy CoinMiner Linux

Researchers identified three malicious PyPI (Python Package Index) packages that deploy a CoinMiner executable on Linux devices, affecting latency in device…

Google Chrome Use After Free Flaw Let Attacker Hijack Browser
04
Jan
2024

Google Chrome Use After Free Flaw Let Attacker Hijack Browser

The latest stable channel update for Google Chrome, version 120.0.6099.199 for Mac and Linux and 120.0.6099.199/200 for Windows, is now available…

Free Decryptor Released for Black Basta Ransomware
04
Jan
2024

Free Decryptor Released for Black Basta Ransomware

A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor…