Category: GBHackers

G2 Names INE 2024 Enterprise and Small Business Leader
27
Sep
2024

G2 Names INE 2024 Enterprise and Small Business Leader

INE, a global leader in networking and cybersecurity training and certifications, is proud to announce they have earned 14 awards…

Malicious App On Google Play Steals Cryptocurrency From Android Users
27
Sep
2024

Malicious App On Google Play Steals Cryptocurrency From Android Users

Cybercriminals have shifted their focus to mobile devices, targeting users with a malicious crypto drainer app disguised as the legitimate…

Hackers Targeting AI Agents And Conversational Platforms To Hijacking The Customer Sessions
27
Sep
2024

Hackers Targeting AI Agents And Conversational Platforms To Hijacking The Customer Sessions

Conversational AI platforms, powered by chatbots, are witnessing a surge in malicious attacks, which leverage NLP and ML are increasingly…

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution
27
Sep
2024

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of…

Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page
27
Sep
2024

Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page

Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing…

Hackers Abusing third-party email infrastructure to Send Spam Mails
27
Sep
2024

Hackers Abusing third-party email infrastructure to Send Spam Mails

Hackers are increasingly exploiting third-party email infrastructures to send spam emails. This tactic complicates the detection and prevention of spam…

Hacking Kia Cars Remotely with a License Plate
27
Sep
2024

Hacking Kia Cars Remotely with a License Plate

Cybersecurity researchers have uncovered a significant vulnerability in Kia vehicles that allowed hackers to remotely control key functions using nothing…

Hackers Weaponizing PDF files To Deliver New SnipBot Malware
26
Sep
2024

Hackers Weaponizing PDF files To Deliver New SnipBot Malware

The RomCom malware family, particularly its SnipBot variant, has evolved into a sophisticated threat capable of ransomware, extortion, and targeted…

Researchers Backdoored Azure Automation Account Packages And Runtime Environments
26
Sep
2024

Researchers Backdoored Azure Automation Account Packages And Runtime Environments

Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages. While base system-generated environments can’t be…

TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data
26
Sep
2024

TWELVE Threat Attacks Windows To Encrypt Then Deleting Victims’ Data

The threat actor, formed in 2023, specializes in ransomware attacks targeting Russian government organizations. It encrypts and deletes victim data,…

Google Warns of North Korean IT Workers Have Infiltrated the U.S. Workforce
26
Sep
2024

Google Warns Of North Korean IT Workers Have Infiltrated The U.S. Workforce

North Korean IT workers, disguised as non-North Koreans, infiltrate various industries to generate revenue for their regime, evading sanctions and…

Beware Of Fake Verify You Are A Human Request That Delivers Malware
26
Sep
2024

Beware Of Fake Verify You Are A Human Request That Delivers Malware

Researchers observed two distinct instances where users were inadvertently led to malicious websites after conducting Google searches for video streaming…