Category: GBHackers

Mysterious Team Bangladesh Hackers Launched 750 DDoS Attacks
04
Aug
2023

Mysterious Team Bangladesh Hackers Launched 750 DDoS Attacks

The notorious Hacktivists group, Known as Mysterious Team Bangladesh, exploits vulnerable versions of PHPMyAdmin and WordPress. It conducts DDoS and…

New Phishing Attack Facebook Business Account Users
03
Aug
2023

New Phishing Attack Facebook Business Account Users

An unreported phishing campaign that disseminated a Python version of the NodeStealer has been found. NodeStealer gave threat actors the ability…

Over 600+ Citrix Servers Hacked To Install Web Shells
03
Aug
2023

Over 600+ Citrix Servers Hacked To Install Web Shells

A critical remote code execution (RCE) vulnerability identified as CVE-2023-3519 has been the subject of several attacks, which have already compromised and…

Hackers Abuse AWS SSM Agent to Perform Malicious Activities
03
Aug
2023

Hackers Abuse AWS SSM Agent to Perform Malicious Activities

Legitimate SSM agents can turn malicious when attackers with high-privilege access use it to carry out ongoing malicious activities on…

Beware of Fake FlipperZero Sites That Promise Free Device Offer
03
Aug
2023

Beware of Fake FlipperZero Sites That Promise Free Device Offer

A website pretending to be Flipper Devices offers a free FlipperZero in exchange for completing an offer, but it merely…

HackerOne Lays off 12% of Its Employees as a One-Time Event 
03
Aug
2023

HackerOne Lays off 12% of Its Employees as a One-Time Event 

HackerOne is a renowned cybersecurity company that offers bounty and penetration testing platforms to ethical hackers for the following activities:-…

CISA Guide to Harden Cisco Firewalls
03
Aug
2023

CISA Guide to Harden Cisco Firewalls

The National Security Agency (NSA) has released best practices for configuring and hardening Cisco Firepower Threat Defense (FTD) which can…

Researchers Uncovered a New Flaw in AI Chatbots to Evil
02
Aug
2023

Researchers Uncovered a New Flaw in AI Chatbots to Evil

LLMs are commonly trained on vast internet text data, often containing offensive content. To mitigate this, developers use “alignment” methods…

Beware! Hacker-Sold macOS HVNC Tool Allows Complete Takeover
02
Aug
2023

Beware! Hacker-Sold macOS HVNC Tool Allows Complete Takeover

Threat actors targeting macOS have increased lately as there were several cases of macOS information stealer malware found in the…

New Collide+Power Exploit Let Attacker Steal Sensitive Data
02
Aug
2023

New Collide+Power Exploit Let Attacker Steal Sensitive Data

The build and shared components on the CPUs are exploited by a method called Collide+Power. This attack vector does not…

CISA Published a Warning about Ivanti Zero-day Vulnerabilities
02
Aug
2023

CISA Published a Warning about Ivanti Zero-day Vulnerabilities

The United States Director of the Cybersecurity and Infrastructure Security Agency (CISA) released a warning on Friday about the active…

New Android Malware Via WhatsApp Steal Call logs
02
Aug
2023

New Android Malware Via WhatsApp Steal Call logs

According to reports, a new Android malware is circulating under the guise of a fake chat application that is being…