Category: GBHackers

Doppler Announces Integration with Datadog to Streamline Security and Monitoring
31
Jan
2025

Doppler Announces Integration with Datadog to Streamline Security and Monitoring

Doppler, the leading provider of secrets management solutions, announced a new integration with Datadog, a cloud application monitoring and security…

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems
30
Jan
2025

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems

A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored cyberespionage operation, tracked as CL-STA-0048….

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials.
30
Jan
2025

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials.

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed to exploit tax filing season….

Files Locked, Backups Erased, and Remote Access Disabled
30
Jan
2025

Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated threat. This Ransomware-as-a-Service (RaaS) operation,…

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages
30
Jan
2025

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed “Tria Stealer,” which exploits fake wedding invitations…

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments
30
Jan
2025

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed by cybersecurity researchers. Introduced by…

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability
30
Jan
2025

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass, is facing scrutiny after the…

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware
30
Jan
2025

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS and Windows users. Researchers revealed this…

Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability
30
Jan
2025

Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability

In a critical development within the AI industry, researchers at Noma Security have disclosed the discovery of a high-severity Remote…

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks
30
Jan
2025

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks

Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in government websites to further phishing campaigns….

Hackers Sell Compromised Emails and Google Ads Accounts on Dark Web
30
Jan
2025

Hackers Sell Compromised Emails and Google Ads Accounts on Dark Web

A new wave of cybercrime is surfacing as hackers exploit compromised emails and digital advertising platforms to create a thriving…

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device
30
Jan
2025

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate and far-reaching operation of the Lazarus…