Category: GBHackers

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs
14
Oct
2024

TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further investigation, where researchers have identified 40…

Beware of Fake AI Scam Calls that Takeover Your Gmail Account
14
Oct
2024

Beware of Fake AI Scam Calls that Takeover Your Gmail Account

Scammers use sophisticated AI technology to impersonate tech giants like Google, aiming to take over unsuspecting users’ Gmail accounts. A…

pac4j Java Framework Vulnerable to RCE Attacks
14
Oct
2024

pac4j Java Framework Vulnerable to RCE Attacks

A critical security vulnerability has been discovered in the popular Java framework pac4j. The vulnerability specifically affects versions before 4.0…

Zendesk Email Spoofing Flaw Let Attackers Access Support Tickets
14
Oct
2024

Zendesk Email Spoofing Flaw Let Attackers Access Support Tickets

A security vulnerability in Zendesk, a widely used customer service tool, has been uncovered. This flaw allowed attackers to access…

18 Individuals Charged for Widespread Manipulation Cryptocurrency Markets
14
Oct
2024

18 Individuals Charged for Widespread Manipulation Cryptocurrency Markets

18 individuals and entities have been charged with widespread fraud and manipulation within the cryptocurrency markets. The charges, unsealed in…

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication
11
Oct
2024

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, which is designed…

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks
10
Oct
2024

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months through automated defense and proactive prevention….

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution
10
Oct
2024

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading Investigations solution used by CTI teams,…

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks
10
Oct
2024

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being actively exploited in cyberattacks. With a…

Wireshark 4.4.1 Released – What’s New!
10
Oct
2024

Wireshark 4.4.1 released, What’s new!

Wireshark, the world’s leading network protocol analyzer, has just released version 4.4.1, bringing a host of bug fixes and updates…

Hackers Exploiting zero-day Flaw in Qualcomm Chips to Attack Android Users
10
Oct
2024

Hackers Exploiting zero-day Flaw in Qualcomm Chips to Attack Android Users

Protect Websites & APIs from Malware Attack Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations,…

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code
10
Oct
2024

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability was found in Foxit PDF Reader,…