Category: GBHackers

Chrome Security Update, Patch for Multiple Security Flaws
19
Dec
2024

Chrome Security Update, Patch for Multiple Security Flaws

72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…

CISA Released Secure Mobile Communication Best Practices
19
Dec
2024

CISA Released Secure Mobile Communication Best Practices

The Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to safeguard mobile communications amid rising concerns…

Cybercriminals Exploit Google Calendar and Drawings in Phishing Campaigns
18
Dec
2024

Cybercriminals Exploit Google Calendar and Drawings in Phishing Campaigns

Attackers are ingeniously exploiting Google Calendar and Google Drawings in phishing campaigns, targeting unsuspecting individuals and organizations. Leveraging the inherent…

Google’s New XRefer Tool to Analyze More Complex Malware Samples
18
Dec
2024

Google’s New XRefer Tool To Analyze More Complex Malware Samples

XRefer, an IDA Pro plugin, enhances binary analysis with a persistent companion view by employing Gemini-powered cluster analysis to decompose…

Azure Data Factory And Apache Airflow Integration Flaws Let Attackers Gain Write Access
18
Dec
2024

Azure Data Factory And Apache Airflow Integration Flaws Let Attackers Gain Write Access

Researchers have uncovered vulnerabilities in Microsoft Azure Data Factory’s integration with Apache Airflow, which could potentially allow attackers to gain…

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families
18
Dec
2024

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol similar to RisePro for downloading…

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials
18
Dec
2024

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns.  Delivered as attachments disguised as…

INTERPOL Urges to End 'Pig Butchering' & Replaces With "Romance Baiting"
18
Dec
2024

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term “romance baiting” to replace “pig butchering,” a phrase widely used to describe a manipulative…

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections
18
Dec
2024

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed “I2PRAT,” which leverages encrypted peer-to-peer (P2P) communication…

A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files
18
Dec
2024

A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Recent research has linked a series of cyberattacks to The Mask group, as one notable attack targeted a Latin American…

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks
18
Dec
2024

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has brought rogue Remote Desktop Protocol (RDP)…

1-Click RCE Attack In Kerio Control UTM Allow Attackers Gain Firewall Root Access Remotely
18
Dec
2024

1-Click RCE Attack In Kerio Control UTM Allow Attackers Gain Firewall Root Access Remotely

GFI Software’s Kerio Control, a popular UTM solution, was found to be vulnerable to multiple HTTP Response Splitting vulnerabilities, which…