Category: GBHackers

Tycoon 2FA Phishing Kit Attacking Microsoft 365 & Gmail Users
26
Mar
2024

Tycoon 2FA Phishing Kit Attacking Microsoft 365 & Gmail Users

Hackers use 2FA (Two-Factor Authentication) phishing kits to overcome the additional security layer provided by 2FA.  These kits typically mimic…

CrowdStrike Partnered with HCLTech-Cybersecurity Transformation
26
Mar
2024

CrowdStrike Partnered with HCLTech-Cybersecurity Transformation

CrowdStrike and HCLTech, a leading global technology company, have announced a strategic partnership. This collaboration aims to enhance HCLTech’s managed…

CISA Warns Of Active Exploitation Of Flaws In Fortinet, Ivanti & Nice Linear
26
Mar
2024

CISA Warns Of Active Exploitation Of Flaws In Fortinet, Ivanti & Nice Linear

A recent security alert warns of three critical vulnerabilities actively exploited in the wild, of which the first is CVE-2023-48788,…

Customers Data Exposed Via Vendor
26
Mar
2024

Customers Data Exposed Via Vendor

Giant Tiger, a prominent Ottawa-based discount retailer, has announced a breach of customer data. This incident, linked to a third-party…

CISA & FBI Warns that Hackers Use SQL Injection Vulnerabilities
26
Mar
2024

CISA & FBI Warns that Hackers Use SQL Injection Vulnerabilities

Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have warned technology manufacturers and their customers…

StrelaStealer Malware Hacked 100+ Organizations
25
Mar
2024

StrelaStealer Malware Hacked 100+ Organizations

Strelastealer malware has been found to be distributed in large-scale campaigns that have currently impacted over 100 organizations across the…

Microsoft To Ban 50+ Products For Users In Russia
25
Mar
2024

Microsoft To Ban 50+ Products For Users In Russia

Softline Group, a major IT solutions provider, has confirmed the suspension of access to cloud products offered by Microsoft, Amazon,…

170K+ User Accounts Hacked by Using Fake Python Infrastructure
25
Mar
2024

170K+ User Accounts Hacked by Using Fake Python Infrastructure

Over 170,000 users have fallen victim to a meticulously orchestrated scheme exploiting the Python software supply chain. The Checkmarx Research…

Russian Hackers Attacking Political Parties In Recent Cyber Attacks
25
Mar
2024

Russian Hackers Attacking Political Parties In Recent Cyber Attacks

Political parties are often targeted by hackers since they want to achieve various goals. This is because hackers may attempt…

Beware of New ‘HelloFire’ Ransomware Actor Mimic as a Pentester
25
Mar
2024

Beware of New ‘HelloFire’ Ransomware Actor Mimic as a Pentester

A new threat is the emergence of a ransomware encryptor dubbed ‘HelloFire.’ This new player in the cybercrime arena is…

Hackers Claiming Unauthorized Access to the Fortinet Devices
25
Mar
2024

Hackers Claiming Unauthorized Access to the Fortinet Devices

Hackers have claimed unauthorized access to Fortinet devices across various companies. This breach highlights cybercriminals’ persistent threat to corporate security…

Hackers Transform the Raspberry Pi into an Online Anonymity Tool - GBHackers on Security
25
Mar
2024

Hackers Transform the Raspberry Pi into an Online Anonymity Tool – GBHackers on Security

A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing…