Category: GBHackers

Malicious Chrome Extension That Delivers Weaponized ZIP Archive
10
Sep
2024

Malicious Chrome Extension That Delivers Weaponized ZIP Archive

In August 2024, researchers detected a malicious Google Chrome browser infection that led to the distribution of LummaC2 stealer malware…

Researchers Details Attacks On Air-Gaps Computers To Steal Data
10
Sep
2024

Researchers Details Attacks On Air-Gaps Computers To Steal Data

The air-gap data protection method isolates local networks from the internet to mitigate cyber threats and protect sensitive data, which…

CISA Issues Warning About Three Actively Exploited Vulnerabilities in the Wild
10
Sep
2024

CISA Issues Warning About Three Actively Exploited Vulnerabilities in the Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about three critical vulnerabilities currently being exploited in…

WhatsApp’s “View Once” Feature Flaw Exploited in the Wild
10
Sep
2024

WhatsApp’s “View Once” Feature Flaw Exploited in the Wild

The Zengo X Research Team has uncovered a critical flaw in WhatsApp’s “View Once” feature, designed to enhance user privacy…

High School in London Forced to Sends Students Home Following Ransomware Attack
10
Sep
2024

High School in London Forced to Sends Students Home Following Ransomware Attack

Charles Darwin School in Biggin Hill, London, has been forced to close its doors following a sophisticated ransomware attack temporarily….

Threat Actors Allegedly Claiming Leak of Capgemini Data
10
Sep
2024

Threat Actors Allegedly Claiming Leak of Capgemini Data

Threat actors have allegedly leaked sensitive data from Capgemini, a global leader in consulting, technology services, and digital transformation. The…

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data
10
Sep
2024

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group, and it has been active since…

Predator Spyware Exploiting “one-click” & “zero-click” Flaws
10
Sep
2024

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to US sanctions, has resurfaced with enhanced…

BBTok Abuses Legitimate Windows Utility Command Tool
10
Sep
2024

BBTok Abuses Legitimate Windows Utility Command Tool

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters.  By leveraging trust…

Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack
10
Sep
2024

Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

IBM has issued a security bulletin addressing critical vulnerabilities in its MQ Operator and Queue Manager container images. These vulnerabilities,…

IBM webMethod Integration Server Vulnerabilities Exposes Systems
10
Sep
2024

IBM webMethod Integration Server Vulnerabilities Exposes Systems

Critical vulnerabilities have been identified, potentially exposing systems to arbitrary command execution. These vulnerabilities, cataloged under the Common Vulnerabilities and…

Young Gamers Under Attack, Here is the List of Games Targeted
09
Sep
2024

Young Gamers Under Attack, Here is the List of Games Targeted

As the new school year begins, students are gearing up for new classes and friendships and diving back into the…