Category: GBHackers

PoC Exploit Code Released for Critical Papercut Flaw
25
Apr
2023

PoC Exploit Code Released for Critical Papercut Flaw

Threat actors are actively taking advantage of critical vulnerabilities present in the PaperCut MF/NG print management software.  This exploitation aims…

Microsoft Taxonomy
25
Apr
2023

Microsoft Changed the Taxonomy of Naming the Hacker groups

Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to…

Enterprise-Attacking Malware Toolkit Analyzing 70 Billion DNS
24
Apr
2023

Enterprise-Attacking Malware Toolkit Analyzing 70 Billion DNS

The ‘Decoy Dog’ malware toolkit, aimed at enterprises, was uncovered recently by the security analysts at Infoblox by analyzing 70…

Ghosttoken - Zero-Day Flaw
24
Apr
2023

Zero-Day Flaw Used to Create Google Accounts

An Israeli cybersecurity company, Astrix’s Security Research Group, discovered a 0-day vulnerability in Google’s Cloud Platform (GCP) dubbed Ghosttoken on…

What is Single Sign on (SSO) ?
23
Apr
2023

What is Single Sign on (SSO) ?

Single Sign-on is an authentication process that helps to log in to multiple applications using single login credentials. Security is…

ChatGPT Tricked To Write Malware while user in Developer Mode
22
Apr
2023

ChatGPT Tricked To Write Malware while user in Developer Mode

Japanese cybersecurity experts warn that ChatGPT can be deceived by users who input a prompt to mimic developer mode, leading…

Kubernetes RBAC
22
Apr
2023

First-Ever Cyber Attack Via Kubernetes RBAC

Recently, a new attack campaign has been discovered by the cybersecurity researchers at Aqua Security that exploits Kubernetes RBAC to…

Critical Flaws in Alibaba postgreSQL let Attackers Access Data
22
Apr
2023

Critical Flaws in Alibaba postgreSQL let Attackers Access Data

Two new critical flaws have been found in Alibaba Cloud’s popular services, ApsaraDB and AnalyticDB. Both of them were in…

AuKill  Malware
22
Apr
2023

AuKill Malware Kills EDR Clients To Attack Windows Systems

A new hacking tool, AuKill, disables Endpoint Detection & Response (EDR) software for threat actors to launch BYOD attacks by…

ICICI Bank Data Leak - Millions of Customers' Data Exposed
21
Apr
2023

ICICI Bank Data Leak – Millions of Customers’ Data Exposed

Researchers have recently found that the ICICI Bank systems misconfiguration caused data leakage, exposing more than 3.6 million customers’ sensitive…

New Linux Malware Linked With 3CX Supply-Chain Attack
21
Apr
2023

New Linux Malware Linked With 3CX Supply-Chain Attack

ESET researchers have recently discovered that Linux users targeted with malware in the new “Operation DreamJob” Lazarus campaign for the…

Russia-linked APT28 Group Exploiting Cisco Routers
21
Apr
2023

Russia-linked APT28 Group Exploiting Cisco Routers

A recent report from CISA (US Cybersecurity and Infrastructure Security Agency)  revealed that the APT 28 group was responsible for…