Category: GBHackers

Hackers Attacking Using Weaponized OpenBullet Pentesting Tool
08
Aug
2023

Hackers Attacking Using Weaponized OpenBullet Pentesting Tool

Recent reports indicate that threat actors have been manipulating Script kiddies or amateur hackers into performing malicious actions that they…

Bug Bounty Program: Microsoft Rewarded $13.8M
08
Aug
2023

Bug Bounty Program: Microsoft Rewarded $13.8M

Microsoft Bug Bounty Program awarded $13.8M for their collaboration with over 345 security researchers from +45 countries around the world…

New PaperCut NG/MF Flaw - Unpatched Windows servers
08
Aug
2023

New PaperCut NG/MF Flaw – Unpatched Windows servers

A Critical vulnerability was discovered in the widely used PaperCut MG/ NF print management software running on Windows prior to…

SkidMap Malware Attacking Linux
07
Aug
2023

New SkidMap Malware Attacking Wide Range of Linux Distributions

According to recent reports, there have been instances of threat actors using malware called “SkidMap” to exploit vulnerable Redis systems….

Microsoft Addresses Azure AD Flaw Following Criticism
07
Aug
2023

Microsoft Addresses Azure AD Flaw Following Criticism

After being criticized as “grossly irresponsible” and “blatantly negligent” by the CEO of Tenable, Microsoft addressed a vulnerability in the…

IBM SDK, Java Technology Flaw
07
Aug
2023

IBM SDK, Java Technology Flaw

IBM has discovered a vulnerability in the IBM SDK, Java Technology Edition, that allows threat actors to execute arbitrary code…

Research Jailbreak Tesla's Software-Locked Worth up to $15,000
07
Aug
2023

Research Jailbreak Tesla’s Software-Locked Worth up to $15,000

Tesla has a reputation for having highly integrated and technologically advanced car computers, which can be used for everything from…

Hackers Deliver Magniber Ransomware Via Windows security update
05
Aug
2023

Hackers Deliver Magniber Ransomware Via Windows security update

Magniber Ransomware was first detected in late 2017; it targeted South Korean users through malvertising attacks using the Magnitude Exploit…

Hackers Deliver STRRAT Malware Using Weaponized PDF Files
05
Aug
2023

Hackers Deliver STRRAT Malware Using Weaponized PDF Files

A versatile Java-based RAT that is capable of keylogging and credential theft from browsers and email clients emerged in 2020…

Exploitation of Vulnerabilities 2022
04
Aug
2023

CISA Advisory of Top 42 Vulnerabilities Frequently Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has published a report which was co-authored by the NSA, FBI, and the…

BEC Attacks
04
Aug
2023

What is BEC Attacks (Business Email Compromise)?

BEC, an acronym for Business Email Compromise, is a sophisticated form of cybercrime. Cyber threats have become a pressing concern…

Hacker group creating Framework
04
Aug
2023

Hacker Group of 1980s Returns With Secure Coding Framework

Cult of the Dead Cow (cDc) is one of the oldest and most highly influential hacking groups that was formed…