Category: GBHackers

Akira Ransomware Actively Exploiting SonicWall firewall RCE Vulnerability
09
Sep
2024

Akira Ransomware Actively Exploiting SonicWall firewall RCE Vulnerability

SonicWall disclosed a critical remote code execution vulnerability (CVE-2024-40766) in SonicOS on August 22nd, 2024. While no active exploitation was…

Halliburton Confirms that Hackers Stolen Data in Cyber Attack
04
Sep
2024

Halliburton Confirms that Hackers Stolen Data in Cyber Attack

Halliburton Company has confirmed that a cyber attack led to unauthorized access and data theft from its systems. The incident,…

PoC Exploit Released For 0-Day Windows Kernel Privilege Escalation Flaw
04
Sep
2024

PoC Exploit Released For 0-Day Windows Kernel Privilege Escalation Flaw

Microsoft released several patches for multiple vulnerabilities during the Patch Tuesday for August 2024. One of the vulnerabilities listed by…

FBI Warns that North Korean Hackers Attacking Crypto Employees
04
Sep
2024

FBI Warns that North Korean Hackers Attacking Crypto Employees

The FBI has issued a stark warning to cryptocurrency companies, highlighting increased sophisticated cyberattacks orchestrated by North Korean hackers. These…

Google Patches Actively Exploited Android 0-day Privilege Escalation Vulnerability
04
Sep
2024

Google Patches Actively Exploited Android 0-day Privilege Escalation Vulnerability

Google has released a patch addressing a critical zero-day vulnerability that has been actively exploited. This vulnerability, CVE-2024-32896, is a…

Blackwired Launches ThirdWatch℠, A Paradigm Shift in Cybersecurity
04
Sep
2024

Blackwired Launches ThirdWatch℠, A Paradigm Shift in Cybersecurity

Blackwired, the leading cyber observatory for disruptive cybersecurity technologies, has announced the launch of ThirdWatch℠, a groundbreaking solution to identify…

BlackByte Hackers Exploiting VMware ESXi Auth Bypass Vulnerability
03
Sep
2024

BlackByte Hackers Exploiting VMware ESXi Auth Bypass Vulnerability

BlackByte, a Ransomware-as-a-Service (RaaS) group that surfaced about mid-2021 appears to have traces of Conti’s evolution. It uses productive sophistication…

SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution
02
Sep
2024

SafeTech Labs Takes Aim at $52B Digital Legacy Industry with World’s First Fully Comprehensive Digital Legacy Solution

The company’s new product covers every base for digital legacies, resulting in the industry’s first truly comprehensive product. SafeTech Labs,…

Snake Keylogger Attack Windows Using Weaponized Excel Doc
30
Aug
2024

Snake Keylogger Attack Windows Using Weaponized Excel Doc

Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant. This attack leverages weaponized Excel documents to…

INE Security Named 2024 SC Awards Finalist
30
Aug
2024

INE Security Named 2024 SC Awards Finalist

Cary, North Carolina, August 30th, 2024, CyberNewsWire: INE Security is pleased to announce that it has been recognized as a…

Voldemort Threat Actors Abusing Google Sheets to Attack Windows Users 
30
Aug
2024

Voldemort Threat Actors Abusing Google Sheets to Attack Windows Users 

Researchers from Proofpoint have uncovered a sophisticated cyberattack campaign leveraging Google Sheets as a command and control (C2) platform. Dubbed…

Iranian Threat Group Attack US Organization Via Ransomware
30
Aug
2024

Iranian Threat Group Attack US Organization Via Ransomware

Iranian cyber actors have been identified as the perpetrators behind ransomware attacks targeting U.S. organizations across multiple sectors. This revelation…