Category: GBHackers

Attackers Spread Lumma Stealer Malware GitHub Comments
30
Aug
2024

Attackers Spread Lumma Stealer Malware GitHub Comments

Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware. This sophisticated threat is part of a…

Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns
30
Aug
2024

Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns

Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct…

Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Gov Websites
30
Aug
2024

Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Gov Websites

Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia. Google’s Threat Analysis…

Check Point to Acquire Cyberint Technologies to Enhance Operations
29
Aug
2024

Check Point to Acquire Cyberint Technologies to Enhance Operations

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading cybersecurity solutions provider, has announced a definitive agreement to acquire Cyberint…

Critical Vulnerability in Perl Module Installer Let Attackers Intercept Traffic
29
Aug
2024

Critical Vulnerability in Perl Module Installer Let Attackers Intercept Traffic

A critical vulnerability has been identified in App::cpanminus (cpanm), a widely used tool for downloading and installing Perl modules. This…

Wireshark 4.4.0 Released – What’s New!
29
Aug
2024

Wireshark 4.4.0 Released – What’s New!

The Wireshark Foundation has announced the release of Wireshark 4.4.0, marking a significant update to the popular open-source network protocol…

Pootry EDR Killer Malware Wipes Out Security Tools From Windows Machine
28
Aug
2024

Pootry EDR Killer Malware Wipes Out Security Tools From Windows Machine

Windows drivers can be abused to bypass security measures. Attackers can exploit vulnerabilities in legitimate drivers or use stolen or…

Research Unveils Eight Android And iOS That Leaks Users Sensitive Data
28
Aug
2024

Research Unveils Eight Android And iOS That Leaks Users Sensitive Data

The eight Android and iOS apps fail to adequately protect user data, which transmits sensitive information, such as device details,…

32 Million Sensitive Records Exposed From Service Management Provider
28
Aug
2024

32 Million Sensitive Records Exposed From Service Management Provider

A significant data breach occurred at ServiceBridge, a technology company specializing in field service management. An unsecured database housing a…

TDECU MOVEit Data Breach, 500,000+ Personal Data Exposed
28
Aug
2024

TDECU MOVEit Data Breach, 500,000+ Personal Data Exposed

Texas Dow Employees Credit Union (TDECU) has disclosed that the personal information of over 500,000 members was exposed due to…

Versa Director Zero-day Vulnerability Let Attackers Upload Malicious Files
28
Aug
2024

Versa Director Zero-day Vulnerability Let Attackers Upload Malicious Files

Versa Networks specializes in successful business. It offers Secure Access Service Edge (SASE), consolidating networking and security services in a…

Airtags Locator Device used to Grab the Stolen Parcel
28
Aug
2024

Airtags Locator Device used to Grab the Stolen Parcel

Two suspects have been apprehended for mail theft after being tracked using an AirTag locator device. The incident unfolded on…