Category: GBHackers

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts
13
Aug
2024

Authorities Seized Dispossessor Ransomware Servers

FBI Cleveland announced a significant victory against cybercrime by disrupting “Radar/Dispossessor,” a notorious ransomware group led by the online moniker…

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts
13
Aug
2024

DeathGrip Ransomware Expanding Services Using RaaS Service

A new Ransomware-as-a-Service (RaaS) platform known as DeathGrip has surfaced, offering sophisticated ransomware tools to aspiring cyber criminals. This service…

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts
13
Aug
2024

PostgreSQL Vulnerability Hackers Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to execute arbitrary SQL functions. This vulnerability…

Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search
12
Aug
2024

Criminal IP and Maltego Collaborate to Broaden Threat Intelligence Data Search

Criminal IP, an expanding Cyber Threat Intelligence (CTI) search engine from AI SPERA, has recently completed its technology integration with…

Telegram Bot Selling Phishing tools to bypass 2FA & hack Microsoft 365 accounts
12
Aug
2024

Telegram Bot Selling Phishing tools to bypass 2FA & hack Microsoft 365 accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against Microsoft 365 and Office 365 environments….

Australian Gold Mining Company Reports Ransomware Attack
12
Aug
2024

Australian Gold Mining Company Reports Ransomware Attack

Evolution Mining Limited, a prominent global player in the gold mining industry, has reported a ransomware attack that impacted its…

Critical AWS Services Vulnerability Let Attackers Execute Remote Code
12
Aug
2024

Critical AWS Services Vulnerability Let Attackers Execute Remote Code

Hackers attack AWS as it hosts a vast number of high-value targets, including sensitive data, business applications, and cloud resources…

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
12
Aug
2024

Hackers Exploiting WinRAR Flaw To Attacks Windows & Linux(ESXi) Machines

Head Mare, a hacktivist group targeting Russia and Belarus, leverages phishing campaigns distributing WinRAR archives to exploit CVE-2023-38831 for initial…

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
12
Aug
2024

NCSC to Build Nation-Scale Evidence Base for Cyber Deception

The UK’s National Cyber Security Centre (NCSC) recently hosted an unprecedented conference at its London headquarters, bringing together international government…

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
12
Aug
2024

Google’s Quick Share Vulnerabilities Let Attackers Execute Remote Code

By reverse-engineering Quick Share’s proprietary communication protocol, researchers uncovered multiple vulnerabilities, including unauthorized file writes, forced Wi-Fi connections, directory traversal,…

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
12
Aug
2024

Authorities Arrested Two Admins of WWH-Club

U.S. authorities have arrested two believed administrators of the notorious WWH-Club, an online marketplace for stolen credit card information. The…

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
10
Aug
2024

GhostWrite Vulnerability Let Hackers Read And Write Any Part Of The Computer’s Memory

Such is the industry, that RISC-V, an open and extensible instruction set architecture (ISA) has now invaded the CPU market,…