Category: GBHackers

Black Basta Ransomware Leverages Microsoft Teams To Deliver Malicious Payloads
10
Dec
2024

Black Basta Ransomware Leverages Microsoft Teams To Deliver Malicious Payloads

In a resurgence since May 2024, the Black Basta ransomware campaign has exhibited a troubling escalation in its attack methods,…

Critical SAP Vulnerabilities Let Attackers Upload Malicious PDF Files
10
Dec
2024

Critical SAP Vulnerabilities Let Attackers Upload Malicious PDF Files

SAP has issued Security Note 3536965 to address multiple high-severity vulnerabilities in the Adobe Document Services of SAP NetWeaver AS for JAVA. These vulnerabilities, identified…

Hackers Target Android Users via WhatsApp to Steal Sensitive Data
10
Dec
2024

Hackers Target Android Users via WhatsApp to Steal Sensitive Data

Researchers analyzed a malicious Android sample created using Spynote RAT, targeting high-value assets in Southern Asia, which, likely deployed by…

Dell Warns of Critical Code Execution Vulnerability in Power Manager
10
Dec
2024

Dell Warns of Critical Code Execution Vulnerability in Power Manager

Dell Technologies has issued a security advisory, DSA-2024-439, to alert users of a critical vulnerability in its Dell Power Manager…

Mauri Ransomware Exploiting Apache ActiveMQ Vulnerability To Deploy CoinMiners
10
Dec
2024

Mauri Ransomware Exploiting Apache ActiveMQ Vulnerability To Deploy CoinMiners

The Apache ActiveMQ server is vulnerable to remote code execution (CVE-2023-46604), where attackers can exploit this vulnerability by manipulating serialized…

Researchers Uncovered Hackers Infrastructre Using Passive DNS Technique
10
Dec
2024

Researchers Uncovered Hackers Infrastructre Using Passive DNS Technique

Cybersecurity researchers have unveiled an advanced technique to uncover hackers’ operational infrastructure using passive DNS data. This groundbreaking method sheds…

New Meeten Malware Attacking macOS And Windows Users To Steal Logins
10
Dec
2024

New Meeten Malware Attacking macOS And Windows Users To Steal Logins

A sophisticated crypto-stealing malware, Realst, has been targeting Web3 professionals, as the threat actors behind this campaign have employed AI-generated…

Let’s Encrypt OCSP End Support
10
Dec
2024

Let’s Encrypt to End Support for Online Certificate Status Protocol (OCSP)

Let’s Encrypt has officially announced its timeline to phase out support for the Online Certificate Status Protocol (OCSP). The nonprofit…

Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins
10
Dec
2024

Hackers Attacking Global Sporting Championships Via Fake Domains To Steal Logins

Cybercriminals online take advantage of well-known events to register malicious domains with keywords related to the event, with the intention…

Authorities Dismantled Hackers Who Stolen Millions Using AirBnB
10
Dec
2024

Authorities Dismantled Hackers Who Stolen Millions Using AirBnB

An international cybercrime network responsible for stealing millions of euros across at least ten European countries has been dismantled in…

APT-C-53 Weaponizing LNK Files To Deploy Malware Into Target Systems
10
Dec
2024

APT-C-53 Weaponizing LNK Files To Deploy Malware Into Target Systems

Gamaredon, a persistent threat actor since 2013, targets the government, defense, diplomacy, and media sectors of their victims, primarily through…

Hackers Can Hijack Your Terminal Via Prompt Injection using LLM-powered Apps
10
Dec
2024

Hackers Can Hijack Your Terminal Via Prompt Injection using LLM-powered Apps

Researchers have uncovered that Large Language Models (LLMs) can generate and manipulate ANSI escape codes, potentially creating new security vulnerabilities…