Category: GBHackers

Research Uncovers Actor Behind Infamous Golden Chickens
30
Jan
2023

Research Uncovers Actor Behind Infamous Golden Chickens

The identity of the individual behind the Golden Chickens malware-as-a-service has been uncovered by cybersecurity experts. The perpetrator, known online…

FBI Hacks Back Hive Ransomware Gang's Infrastructure
28
Jan
2023

FBI Hacks Back Hive Ransomware Gang’s Infrastructure

As a result of an international law enforcement operation, the sites utilized by the Hive ransomware operation for both payments…

Yandex Data Leak - Code Published On Popular Hacking Forum
27
Jan
2023

Yandex Data Leak – Code Published On Popular Hacking Forum

The source code of Yandex, the largest IT company in Russia and commonly referred to as the Russian Google, was…

Hackers Abuse Legitimate Remote Monitoring Tools
27
Jan
2023

Hackers Abuse Legitimate Remote Monitoring Tools

A joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing…

U.S. Sues Google for Dominance Over Advertising Technologies
26
Jan
2023

U.S. Sues Google for Dominance Over Advertising Technologies

Recently, the US Justice Department along with the eight states filed a lawsuit against Google, accusing the company of having…

Top FinTech API Security Challenges
25
Jan
2023

Top FinTech API Security Challenges

A recent report reveals that the number of attacks on financial service APIs and web applications worldwide increased by 257%.   There are…

Wireshark 4.0.3 Released - What's New!
25
Jan
2023

Wireshark 4.0.3 Released – What’s New!

The Wireshark Team has recently unveiled the latest iteration of their widely-utilized packet analyzer, Wireshark 4.0.3.  This version boasts a…

Hackers Using Sliver Framework Instead of Cobalt Strike & Metasploit
25
Jan
2023

Hackers Using Sliver Framework Instead of Cobalt Strike & Metasploit

Silver is an open-source command-and-control framework that is becoming increasingly popular among malicious actors at current attacks. As threat actors…

What is XDR, MXDR, DRs & SBOM ?
24
Jan
2023

What is XDR, MXDR, DRs & SBOM ?

The field of cybersecurity is rife with acronyms. From AES to VPN, these technical alphabet soup terms have been part…

Chinese Hackers Exploit FortiOS Zero-Day Bug to Deploy Malware
24
Jan
2023

Chinese Hackers Exploit FortiOS Zero-Day Bug to Deploy Malware

Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN that had only…

ChatGPT Can Be Used to Create Dangerous Polymorphic Malware
23
Jan
2023

ChatGPT Can Be Used to Create Dangerous Polymorphic Malware

The cybersecurity experts at CyberArk have provided information on the mechanism by which the ChatGPT AI chatbot can produce a…

Unified CM SQL Injection Flaw Let Attackers Execute SQL Queries
23
Jan
2023

Unified CM SQL Injection Flaw Let Attackers Execute SQL Queries

Cisco released fixes for Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition to address high-severity SQL injection…