Category: GBHackers

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems
08
Oct
2024

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with the intention of targeting Russian government…

Hackers Gained Unauthorized Network Access to Casio Networks
08
Oct
2024

Hackers Gained Unauthorized Network Access to Casio Networks

Casio Computer Co., Ltd. has confirmed that a third party illegally accessed its network on October 5th, leading to significant…

Open-Source Scanner Released to Detect CUPS Vulnerability
08
Oct
2024

Open-Source Scanner Released to Detect CUPS Vulnerability

A new open-source scanner has been released to detect a critical vulnerability in the Common Unix Printing System (CUPS), explicitly…

Serhiy Tokarev told about Roosh's investment in the French freelance platform 
08
Oct
2024

Serhiy Tokarev told about Roosh’s investment in the French freelance platform 

Ukrainian Roosh Ventures has invested in the French freelance platform Jump. This was announced by tech entrepreneur and co-founder of…

Comcast Cyber Attack Impacts 237,000+ Users Personal Data
08
Oct
2024

Comcast Cyber Attack Impacts 237,000+ Users Personal Data

Comcast Cable Communications LLC has reported that over 237,000 users’ data has been compromised. The breach, which occurred on February…

American Water Works Cyber Attack Impacts IT Systems
08
Oct
2024

American Water Works Cyber Attack Impacts IT Systems

American Water Works Company, Inc., a leading provider of water and wastewater services, announced that it had detected unauthorized activity…

Google Blocked Malicious Sideloading Apps for Indian Users
08
Oct
2024

Google Blocked Malicious Sideloading Apps for Indian Users

Google has launched a pilot program to block malicious sideloading apps. This initiative is part of Google’s ongoing efforts to…

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection
07
Oct
2024

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has partnered with Hybrid Analysis, a…

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code
07
Oct
2024

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that could allow attackers to execute remote…

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files
07
Oct
2024

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual Studio by focusing on vulnerabilities that…

Microsoft & DOJ Dismantles Hundreds of Websites Used by Russian Hackers
07
Oct
2024

Microsoft & DOJ Dismantles Hundreds of Websites Used by Russian Hackers

Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations of Star Blizzard, a notorious Russian hacking group….

Chinese Group Hacked US Court Wiretap Systems
07
Oct
2024

Chinese Group Hacked US Court Wiretap Systems

Chinese hackers have infiltrated the networks of major U.S. broadband providers, gaining access to systems used for court-authorized wiretapping. According…