Category: GBHackers

Tenable CEO Passed Away
06
Jan
2025

Tenable CEO “Amit Yoran” Passed Away at the Age of 54

Tenable Holdings, Inc. has announced with profound sadness the unexpected passing of its Chairman and Chief Executive Officer, Amit Yoran,…

North Korean Hackers Wipe Cryptocurrency Wallets via Fake Job Interviews
06
Jan
2025

North Korean Hackers Wipe Cryptocurrency Wallets via Fake Job Interviews

Cybersecurity experts have uncovered a new wave of cyberattacks linked to North Korean threat actors targeting cryptocurrency wallets in an…

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware
03
Jan
2025

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome extensions, which can manipulate emails, track…

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands
03
Jan
2025

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours
03
Jan
2025

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive disruption on January 2, 2025, after…

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit
03
Jan
2025

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit alleging that its Siri voice assistant…

iTerm2 Emulator Vulnerability Let Attackers Access Sensitive User Data
03
Jan
2025

iTerm2 Emulator Vulnerability Let Attackers Access Sensitive User Data

 A critical vulnerability discovered in the popular macOS terminal emulator iTerm2 has raised concerns among cybersecurity experts and software users….

Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA
02
Jan
2025

Researchers Uncover Phishing-As-A-Service Domains Associated With Tycoon 2FA

The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor…

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings
02
Jan
2025

New PLAYFULGHOST Malware Hacking Devices To Remotely Capture Audio Recordings

PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via phishing emails and SEO poisoning of…

PoC Exploit Released for Critical Windows LDAP RCE Vulnerability
02
Jan
2025

PoC Exploit Released For Critical Windows LDAP RCE Vulnerability

The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers, as a zero-click exploit leverages this…

Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys
02
Jan
2025

Windows 11 BitLocker Encryption Bypassed to Extract Full Volume Encryption Keys

A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11 (version 24H2) by extracting full volume…

Trend Micro Apex One Vulnerabilities Let Escalate Privilege
02
Jan
2025

Trend Micro Apex One Vulnerabilities Let Escalate Privilege

72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…